Performance analysis of peer-to-peer botnets using "The Storm Botnet" as an exemplar

dc.contributor.authorAgarwal, Sudhir
dc.contributor.supervisorGanti, Sudhakar
dc.contributor.supervisorNeville, Stephen William
dc.date.accessioned2010-05-03T15:57:52Z
dc.date.available2010-05-03T15:57:52Z
dc.date.copyright2010en
dc.date.issued2010-05-03T15:57:52Z
dc.degree.departmentDept. of Computer Scienceen
dc.degree.levelMaster of Science M.Sc.en
dc.description.abstractAmong malicious codes like computer viruses and worms, botnets have attracted a significant attention and have been one of the biggest threats on the Internet. Botnets have evolved to incorporate peer-to-peer communications for the purpose of propagating instructions to large numbers of computers (also known as bot) under the botmaster's control. The impact of the botnet lies in its ability for a bot master to execute large scale attacks while remaining hidden as the true director of the attack. One such recently known botnet is the Storm botnet. Storm is based on the Overnet Distributed Hash Table (DHT) protocol which in turn is based on the Kademlia DHT protocol. Significant research has been done for determining its operational size, behaviour and mitigation approaches. In this research, the peer-to-peer behaviour of Storm is studied by simulating its actual packet level network behaviour. The packet level simulator is developed via the simulation framework OMNET++ to determine the impact of design parameters on botnets performance and resilience. Parameters such as botnet size, peer list size, the number of bot masters and the key propagation time have been explored. Furthermore, two mitigation strategies are considered: a) random removal strategy (disinfection strategy), that removes selected bots randomly from the botnet; b) Sybil disruption strategy, that introduces fake bots into the botnet with the task of propagating Sybil values into the botnet to disrupt the communication channels between the controllers and the compromised machines. The simulation studies demonstrate that Sybil disruption strategies outperform random removal strategies. The simulation results also indicate that random removal strategies are not even effective for a small sized networks. The results of the simulation studies are particularly applicable to the Storm botnet but these results also provide insights that can be applied to peer-to-peer based botnets in general.en
dc.identifier.urihttp://hdl.handle.net/1828/2689
dc.languageEnglisheng
dc.language.isoenen
dc.rightsAvailable to the World Wide Weben
dc.subjectStorm Botneten
dc.subjectKademlia Protocolen
dc.subjectPeer-To-Peeren
dc.subject.lcshUVic Subject Index::Sciences and Engineering::Applied Sciences::Computer scienceen
dc.titlePerformance analysis of peer-to-peer botnets using "The Storm Botnet" as an exemplaren
dc.typeThesisen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
thesis_Sudhir.pdf
Size:
944.42 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.83 KB
Format:
Item-specific license agreed upon to submission
Description: