Aerosol Posted January 14, 2015 Report Posted January 14, 2015 1. INTRODUCTIONNowadays, one of the main threats that the Internet users face are botnets. Botnets are employedfor many kind of malicious activities; examples are DDoS, personal data theft, spam, bitcoinmining, and cyber-espionage [19][9]. In the last ten years, the main antivirus vendors havereported a constant growth of botnets in the wild [1][2].Traditionally, botnets are centralised overlay networks where the Command-and-Control (C&C)servers act as single point of control. Centralised botnets are easy to manage and maintain dueto their centralised structure. A botmaster has a clear overview of the overlay network and shemanages the bots, which, in turn, connect to the C&C servers to be reachable. Nevertheless,this architecture has an important drawback: the C&C servers are exposed and represent asingle point of failure. Hence, by taking down the C&C servers, the whole botnet is defeated.In order to overcome this problem, botmasters have moved to more resilient unstructured P2P Read more: https://ccdcoe.org/cycon/2014/proceedings/d3r2s3_casenove.pdf Quote