Attack Mechanism using botnets Presented by : Bharat Soundararajan Amit Shrivastava
BACKGROUND OF BOTNETS Different types of botnet communication Centralized communication: Group of bots connected to C&C center Decentralized communication( P2P):Each Bot is connected to its peer list
Centralized Botnet bot C&C botmaster
Decentralized Botnet Servent bots Client bots Hybrid P2P
WEAKNESSES OF CENTRALIZED AND DECENTRALIZED SYSTEMS A weakness of traditional centralized botnet C&C is the single point of failure: an entire botnet can be dismantled by bringing down a single node (the C&C server) Decentralized: Even though defenders may not be able to capture a botnet sensor before its botmaster destroying the sensor (after completing botmaster's monitoring task), they still could use the captured traffic log to figure out the IP addresses of potential bots who contacted the sensor in the past
Future Enhancements Analysis of all the bot infection Study of all the topologies to create a new architecture Two way attack: First approach: Hiding the bots IP address Second approach: Changing the IP address of bots Third approach: Starting infection using centralized and converting it into peer to peer.
Any Suggestions?