Presentation is loading. Please wait.

Presentation is loading. Please wait.

MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.

Similar presentations


Presentation on theme: "MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA."— Presentation transcript:

1 MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA

2 INTRODUCTION Major threat to the security of internet Botnet is a collection of compromised computer under a control of single identity known as the bot controller Botnet uses vulnerability like other malwares to infect other machines in the network Different types of bots: Agobot, Sdbot, Spybot, GTbot

3 HOW BOTNETS WORK A botnet operator sends worm continuously infecting ordinary users The bot on the infected PC logs into a web server called Command & Control server(C&C) The botnet operator send instructions via server to the infected PC’s Used as a platform for DDOS and Spam attacks

4 Different types of Bot communication  Centralized Communication Group of bots connected to C&C server Weaknesses:  They can be easier because many clients connect the same point  Discovery of the central location can compromise the whole system

5 Centralized Botnet 5 bot C&C botmaster bot C&C

6 Hybrid P2P Botnet Decentralized communication: Each bots connected to its peer list Only servent bots are in the peer list Weaknesses: Even though defenders may not be able to capture a botnet sensor before its botmaster destroying the sensor (after completing botmaster's monitoring task), they still could use the captured traffic log to figure out the IP addresses of potential bots who contacted the sensor in the past

7 Servent bots Client bots Hybrid P2P Botnet Hybrid P2P

8 Mosquito Breeding Attack New attack using both Peer2Peer architecture and centralized architecture A centralized bots will generate many P2P bots inside the internet These P2P bots will start a separate network and get new peers for its new network

9 C&C BOTS Mosquito Breeding Attack

10 C&C BOTS Mosquito Breeding Attack

11 SIMULATION Platform: Windows/Linux Tools: Eclipse Source Code: Java/Applet File: Random.java

12 Algorithm Step1: Simulate Arbitrary Servers/Attackers Step2: Simulate Random Number Of clients(bots) Step3: Generate Botnet attacks from the attackers to the client Step4: The server loads the code into any randomly chosen client Step5: The client inturn becomes the server Step6: New bot continues breeding the code among the new clients

13 DEMO FOR THE SIMULATION

14 Bot Conversion Model Bots gets converted from client to server is identified Time taken for each bot to change from client to server is calculated A graph is drawn using bots in the X-axis and time taken for conversion in the Y-axis

15 Botnet Conversion Study Number of Bots converted from clients to servers Conversion time in seconds

16 ADVANTAGES To overcome the problem of C&C center in botnet Capturing of one C&C doesn’t affect the architecture It works independently More robust and more probing

17 CONCLUSION This shows how bots may work in the future We have shown by simulation how attack propagate We have also shown the conversion time of bots into c&c server

18 THANK YOU


Download ppt "MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA."

Similar presentations


Ads by Google