An Adaptive Defense Mechanism for P2P Bots

碩士 === 中原大學 === 資訊工程研究所 === 98 === Abstract Among all the security threats in the cyberworld, botnet is one which is highly destructive and ever-increasingly populated such that an attacker can remotely control a large set of compromised computers to launch group or individual attacks against target...

Full description

Bibliographic Details
Main Authors: Keng-Wei Liu, 劉耕瑋
Other Authors: Hsiao-Rong Tyan
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/932pvf
id ndltd-TW-098CYCU5392039
record_format oai_dc
spelling ndltd-TW-098CYCU53920392019-05-15T20:33:09Z http://ndltd.ncl.edu.tw/handle/932pvf An Adaptive Defense Mechanism for P2P Bots P2PBots之適應性防禦機制 Keng-Wei Liu 劉耕瑋 碩士 中原大學 資訊工程研究所 98 Abstract Among all the security threats in the cyberworld, botnet is one which is highly destructive and ever-increasingly populated such that an attacker can remotely control a large set of compromised computers to launch group or individual attacks against targeted or non-targeted system. In recent years, the operation model of botnet control has evolved from the centralized IRC or HTTP botnets to the decentralized P2P botnet. The change inflicted degradation in the ability to detect the existence of botnet. The new P2P botnet adopting P2P communication model allows an attacker the capability to deliver attack command from any node in a P2P botnet. Hence, the existing botnet detection or defense mechanisms based on the centralized operation model are not effective in deterring the threats resulted from P2P botnet. Therefore, we devised a 2-stage adaptive detection and defense mechanism for P2P botnet. Processes utilizing P2P communication model are identified according to their network behavior. Then, they are subjected to be monitored for all activities on host computers. When any of the designated anomaly behaviors is detected, defense mechanism, such as the activation of a firewall rule to block the traffic to or from the corresponding communication port, are employed. The proposed mechanism can perform the intended defense whether or not the bot malware is a known one, a variation or a previously unknown one. A prototype system has been implemented and the effectiveness of the proposed scheme is verified. Hsiao-Rong Tyan 田筱榮 2010 學位論文 ; thesis 45 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中原大學 === 資訊工程研究所 === 98 === Abstract Among all the security threats in the cyberworld, botnet is one which is highly destructive and ever-increasingly populated such that an attacker can remotely control a large set of compromised computers to launch group or individual attacks against targeted or non-targeted system. In recent years, the operation model of botnet control has evolved from the centralized IRC or HTTP botnets to the decentralized P2P botnet. The change inflicted degradation in the ability to detect the existence of botnet. The new P2P botnet adopting P2P communication model allows an attacker the capability to deliver attack command from any node in a P2P botnet. Hence, the existing botnet detection or defense mechanisms based on the centralized operation model are not effective in deterring the threats resulted from P2P botnet. Therefore, we devised a 2-stage adaptive detection and defense mechanism for P2P botnet. Processes utilizing P2P communication model are identified according to their network behavior. Then, they are subjected to be monitored for all activities on host computers. When any of the designated anomaly behaviors is detected, defense mechanism, such as the activation of a firewall rule to block the traffic to or from the corresponding communication port, are employed. The proposed mechanism can perform the intended defense whether or not the bot malware is a known one, a variation or a previously unknown one. A prototype system has been implemented and the effectiveness of the proposed scheme is verified.
author2 Hsiao-Rong Tyan
author_facet Hsiao-Rong Tyan
Keng-Wei Liu
劉耕瑋
author Keng-Wei Liu
劉耕瑋
spellingShingle Keng-Wei Liu
劉耕瑋
An Adaptive Defense Mechanism for P2P Bots
author_sort Keng-Wei Liu
title An Adaptive Defense Mechanism for P2P Bots
title_short An Adaptive Defense Mechanism for P2P Bots
title_full An Adaptive Defense Mechanism for P2P Bots
title_fullStr An Adaptive Defense Mechanism for P2P Bots
title_full_unstemmed An Adaptive Defense Mechanism for P2P Bots
title_sort adaptive defense mechanism for p2p bots
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/932pvf
work_keys_str_mv AT kengweiliu anadaptivedefensemechanismforp2pbots
AT liúgēngwěi anadaptivedefensemechanismforp2pbots
AT kengweiliu p2pbotszhīshìyīngxìngfángyùjīzhì
AT liúgēngwěi p2pbotszhīshìyīngxìngfángyùjīzhì
AT kengweiliu adaptivedefensemechanismforp2pbots
AT liúgēngwěi adaptivedefensemechanismforp2pbots
_version_ 1719100191300124672