2.1 Background
A number of P2P-based botnets have been seen over the past decade, and a few of them have been taken down only recently with the combined effort of multiple nations. The massive Citadel botnet (a variant of the Zeus (or‘Gameover’) P2P botnet) is believed to have stolen more than US $500 million from bank accounts over 18 months. It was reported in the past year that the 88% of the botnet has been taken down by the combined efforts of Microsoft and several security agencies and authorities of more than
80 countries [11]. However, recent reports claim that the botnet is on the rise again with a tweaked version being used to target a small number of European banks [12]. A variant of the Zeus P2P botnet also targeted Nokia phones using Symbian OS [13]. The botnet operated by installing a malware on the smart phone (via drive-by download from infected websites), which was used to steal the username-password credentials of the victim’s online bank account transactions. The stolen details were forwarded to the bot-master.
Storm, a state-of-the-art botnet of its time, was known to comprise of at least a few million ‘bots’ when at its peak. It was involved in massive spamming activities in early 2007. Even the anti-spamming websites which tar- geted Storm came under a DDoS attack by the botnet [14]. Researchers have confirmed that the Waledac botnet is an improved version of the Storm botnet [15]. Waledac was capable of sending about 1.5 billion spam messages a day. It also had the capabilities to download and execute bina- ries and mine the infected systems for sensitive data. It was taken down in the year 2010.
A P2P bot’s life cycle consists of the following stages:
• Infection stage, during which the bot spreads (this might happen through drive-by downloads, a malicious software being installed by the end-user, infected USB sticks, etc.)
• Rally stage, where the bot connects with a peer list in
order to join the P2P network
• Waiting stage, where the bot waits for the
bot-master’s command (and does not exhibit much activity otherwise)
• Execution stage, in which it actually carries out a
command, such as a denial of service (DoS) attack, generate spam emails, etc.
2.1 2.1 Background
ประวัติจำนวนP2P A number of P2P- -botnets บ็อตเน็ตป้อมปราการขนาดใหญ่ based botnets have been seen over the past decade, and a few of them have been taken down only recently with the combined effort of multiple nations. The massive Citadel botnet (a variant of the Zeus (or' บ็อตเน็ต มีรายงานในปีที่ผ่านมาว่า 80 อย่างไรก็ตามรายงานล่าสุดอ้างว่าบ็อตเน็ตเป็นที่ขึ้นอีกครั้งกับรุ่นเอ็นดูถูกนำมาใช้ในการกำหนดเป้าหมายจำนวนเล็ก ๆ ของธนาคารในยุโรป ตัวแปรของบ็อตเน็ต ‘Gameover’) P2P botnet) is believed to have stolen more than US $500 million from bank accounts over 18 months. It was reported in the past year that the 88% of the botnet has been taken down by the combined efforts of Microsoft and several security agencies and authorities of more than
80 countries [11]. However, recent reports claim that the botnet is on the rise again with a tweaked version being used to target a small number of European banks [12]. A variant of the Zeus P2P botnet also targeted Nokia phones using Symbian OS [13]. The botnet operated by installing a malware on the smart phone (via drive-by download from infected websites), which was used to steal the username-password credentials of the victim’s online bank account transactions. The stolen details were forwarded to the bot-master.
Storm, a state-of-the-art botnet of its time, was known to comprise of at least a few million ‘bots’ when at its peak. It was involved in massive spamming activities in early 2007. Even the anti-spamming websites which tar- geted Storm came under a DDoS attack by the botnet [14]. Researchers have confirmed that the Waledac botnet is an improved version of the Storm botnet [15]. Waledac was capable of sending about 1.5 billion spam messages a day. It also had the capabilities to download and execute bina- ries and mine the infected systems for sensitive data. It was taken down in the year 2010.
A P2P bot’s life cycle consists of the following stages:
• Infection stage, during which the bot spreads (this might happen through drive-by downloads, a malicious software being installed by the end-user, infected USB sticks, etc.)
• Rally stage, where the bot connects with a peer list in
order to join the P2P network
• Waiting stage, where the bot waits for the
bot-master’s command (and does not exhibit much activity otherwise)
• Execution stage, in which it actually carries out a
command, such as a denial of service (DoS) attack, generate spam emails, etc.
การแปล กรุณารอสักครู่..
