2013 IEEE Symposium on Security and Privacy 2013
DOI: 10.1109/sp.2013.17
|View full text |Cite
|
Sign up to set email alerts
|

SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets

Abstract: Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet controllers have sought new ways to harden the infrastructures of their botnets. In order to meet this objective, some botnet operators have (re)designed their botnets to use Peer-to-Peer (P2P) infrastructures. Many P2P botnets are far more resilient to takedown attempts than centralized botnets, because they have no single points of failure. However, P2P botnets are subject to unique cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
122
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 140 publications
(127 citation statements)
references
References 16 publications
(24 reference statements)
3
122
0
Order By: Relevance
“…column gives the number of infections extrapolated as described in Section IV-D. The population estimate is much lower than previously published estimates [27], [33], which suggest the ZeroAccess bot population is between 1.2 to 9 million. However, our estimates are only for the 976 binaries we obtained and know to engage in Bitcoin mining for specific wallets.…”
Section: B Zeroaccessmentioning
confidence: 75%
“…column gives the number of infections extrapolated as described in Section IV-D. The population estimate is much lower than previously published estimates [27], [33], which suggest the ZeroAccess bot population is between 1.2 to 9 million. However, our estimates are only for the 976 binaries we obtained and know to engage in Bitcoin mining for specific wallets.…”
Section: B Zeroaccessmentioning
confidence: 75%
“…Botmasters have utilized the resilience offered by P2P networks to build botnets wherein bots communicate, pass on commands and update other bots in a P2P fashion [14]. Just as a P2P network is resilient to break-down if a few peers leave the network, P2P botnets have proven to be highly resilient even if a certain number of bots are identified and taken-down [15], [16].…”
Section: Introductionmentioning
confidence: 99%
“…Unlike with BotProfiler, controlling the false positive rate is generally difficult with these anomaly-based systems, and they are also difficult to deploy in a large and real network. Rossow et al proposed a method to observe and model P2P botnets such as Zeus, ZeroAccess, and Kelihos [25]. Also, Zhang et al proposed a method to detect such P2P botnet activities in a network [26].…”
Section: Modeling and Detecting Botnetsmentioning
confidence: 99%