Skip to main navigation Skip to search Skip to main content

RatBot: Anti-enumeration peer-to-peer botnets

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

As evidenced by the recent botnet turf war between SpyEye and Zeus, the cyber space has been witnessing an increasing number of battles or wars involving botnets among different groups, organizations, or even countries. One important aspect of a cyber war is accurately estimating the attack capacity of the enemy. Particularly, each party in a botnet war would be interested in knowing how many compromised machines his adversaries possess. Towards this end, a technique often adopted is to infiltrate into an adversary's botnet and enumerate observed bots through active crawling or passive monitoring methods. In this work, we study potential tactics that a botnet can deploy to protect itself from being enumerated. More specifically, we are interested in how a botnet owner can bluff the botnet size in order to intimidate the adversary, gain media attention, or win a contract. We introduce RatBot, a P2P botnet that is able to defeat existing botnet enumeration methods. The key idea of RatBot is the existence of a fraction of bots that are indistinguishable from their fake identities. RatBot prevents adversaries from inferring its size even after its executables are fully exposed. To study the practical feasibility of RatBot, we implement it based on KAD, and use large-scale high-fidelity simulation to quantify the estimation errors under diverse settings. The results show that a naive enumeration technique can significantly overestimate the sizes of P2P botnets. We further present a few countermeasures that can potentially defeat RatBot's anti-enumeration scheme.

Original languageEnglish
Title of host publicationInformation Security - 14th International Conference, ISC 2011, Proceedings
Pages135-151
Number of pages17
DOIs
StatePublished - 2011
Event14th International Conference on Information Security, ISC 2011 - Xi'an, China
Duration: Oct 26 2011Oct 29 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7001 LNCS

Conference

Conference14th International Conference on Information Security, ISC 2011
Country/TerritoryChina
CityXi'an
Period10/26/1110/29/11

Fingerprint

Dive into the research topics of 'RatBot: Anti-enumeration peer-to-peer botnets'. Together they form a unique fingerprint.

Cite this