Jump to content
Aerosol

Botnet over Tor: The Illusion of Hiding

Recommended Posts

1. INTRODUCTION

Nowadays, one of the main threats that the Internet users face are botnets. Botnets are employed

for many kind of malicious activities; examples are DDoS, personal data theft, spam, bitcoin

mining, and cyber-espionage [19][9]. In the last ten years, the main antivirus vendors have

reported a constant growth of botnets in the wild [1][2].

Traditionally, botnets are centralised overlay networks where the Command-and-Control (C&C)

servers act as single point of control. Centralised botnets are easy to manage and maintain due

to their centralised structure. A botmaster has a clear overview of the overlay network and she

manages the bots, which, in turn, connect to the C&C servers to be reachable. Nevertheless,

this architecture has an important drawback: the C&C servers are exposed and represent a

single point of failure. Hence, by taking down the C&C servers, the whole botnet is defeated.

In order to overcome this problem, botmasters have moved to more resilient unstructured P2P

Read more: https://ccdcoe.org/cycon/2014/proceedings/d3r2s3_casenove.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...