期刊文献+

One-to-Any Command and Control Model:Precisely Coordinated Operation on Uncooperative Controlled Nodes 被引量:1

One-to-Any Command and Control Model:Precisely Coordinated Operation on Uncooperative Controlled Nodes
原文传递
导出
摘要 New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures. New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures.
出处 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第6期490-498,共9页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(61402526,61502528)
关键词 one-to-any command and control(C&C) model directional command publishing(DCP) mechanism precisely cooperative attack uncooperative controlled node one-to-any command and control(C&C) model directional command publishing(DCP) mechanism precisely cooperative attack uncooperative controlled node
  • 相关文献

参考文献1

二级参考文献6

  • 1Studer A, Perrig A. The coremelt attack [ C ]//Proceedings of the 14th European Symposium on Research in Computer Security ( ESORICS 2009). 2009:37-52.
  • 2Schuchard M, Vasserman E Y, Mohaisen A. Losing Control of the Internet : Using the Data Plane to Attack the Control Plane [ C]//NDSS. The Internet Society. 2011:726-728.
  • 3Wang P, Sparks S, Zou C C. An advanced hybrid peer-to-peer botnet[ C ]//Proceedings 2007 USENIX First workshop on Hot Topics in Understanding Botnets. 2007:113-127.
  • 4Daswani N, Stoppelman M. The Google Click Quality and Security Teams, The anatomy of Clickbot [ C ]//Proc. of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007). 2007:21-28.
  • 5Starnberger G, Kruegel C, Kirda E. Overbot-a botnet protocol based on kademlia[ C ]//Proc. of the gth Int. Conf. on Securi- ty and Privacy in Communication Networks (SecureComm '08). 2008:13-18.
  • 6诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157

同被引文献10

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部