About this Journal Submit a Manuscript Table of Contents
Discrete Dynamics in Nature and Society
Volume 2012 (2012), Article ID 865075, 18 pages
http://dx.doi.org/10.1155/2012/865075
Research Article

Modeling and Analysis of Peer-to-Peer Botnets

1State Key Laboratory of Power Transmission Equipment and System Security, College of Computer Science, Chongqing University, Chongqing 400044, China
2Department of Computer Science and Technology, Xinzhou Normal University, Shanxi 034000, Xinzhou, China
3Department of Computer Science and Technology, North University of China, Shanxi 030051, Taiyuan, China

Received 23 July 2012; Revised 28 September 2012; Accepted 28 September 2012

Academic Editor: Xiaofan Yang

Copyright © 2012 Liping Feng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. P. Song, Z. Jin, and G. Q. Sun, “Modeling and analyzing of botnet interactions,” Physica A, vol. 390, no. 2, pp. 347–358, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. W. F. Zhang and C. Jin, “The research on approaches for botnet detection,” Energy Procedia, vol. 13, pp. 9726–9732, 2011. View at Publisher · View at Google Scholar
  3. “Symantec Internet Security Threat Report,” 2011, http://www.symantec.com/threatreport/topic.jsp?id=threatreport.
  4. A. K. Seewald and W. N. Gansterer, “On the detection and identification of botnets,” Computers and Security, vol. 29, no. 1, pp. 45–58, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Elliott, “Botnets: to what extent are they a threat to information security?” Information Security Technical Report, vol. 15, no. 3, pp. 79–103, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Lu, G. Rammidi, and A. A. Ghorbani, “Clustering botnet communication traffic based on n-gram feature selection,” Computer Communications, vol. 34, no. 3, pp. 502–514, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Rrushi, E. Mokhtari, and A. A. Ghorbani, “Estimating botnet virulence within mathematical models of botnet propagation dynamics,” Computer & Security, vol. 30, pp. 791–802, 2011. View at Publisher · View at Google Scholar
  8. G. P. Schaffer, “Worms and viruses and botnets, Oh My!: rational responses to emerging internet threats,” IEEE Security and Privacy, vol. 4, no. 3, pp. 52–58, 2006. View at Publisher · View at Google Scholar
  9. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “Inside the slammer worm,” IEEE Security and Privacy, vol. 1, no. 4, pp. 33–39, 2003. View at Publisher · View at Google Scholar · View at Scopus
  10. G. Goth, “Fast-moving Zombies: botnets stay a step ahead of the fixes,” IEEE Internet Computing, vol. 11, no. 2, pp. 7–9, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Barford and V. Yegneswaran, “An inside look at botnets,” Malware Detection, vol. 27, pp. 171–191, 2007. View at Publisher · View at Google Scholar
  12. D. Dagon, C. C. Zou, and W. K. Lee, “Modeling botnet propagation using time and zones,” in Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS' 06), 2006.
  13. J. B. Grizzard, V. Sharma, C. Nunnery, and B. B. H. Kang, “Peer-to-peer botnet: overview and case study,” in Proceedings of the 1st conference on First Workshop on Hot Topics in understanding Botnets, pp. 1–8, 2007.
  14. T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, “Measurements and mitigation of peer-to- peer-based botnets: a case study on storm eorm,” in Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008.
  15. E. Van Ruitenbeek and W. H. Sanders, “Modeling peer-to-peer botnets,” in Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST '08), pp. 307–316, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Kolesnichenko, A. Remke, P. T. Boer, and B. R. Haverkort, “Comparison of the mean-field approach and simulation in a peer-to-peer botnet case study,” Computer Performance Engineering, vol. 6977, pp. 133–147, 2011. View at Publisher · View at Google Scholar
  17. G. Yan, D. T. Ha, and S. Eidenbenz, “AntBot: anti-pollution peer-to-peer botnets,” Computer Networks, vol. 55, no. 8, pp. 1941–1956, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. P. Wang, B. Aslam, and C. C. Zou, Peer-to-Peer Botnets: The Next Generation of Botnet Attacks, School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Fla, USA, 2010.
  19. J. G. Ren, X. F. Yang, Q. Y. Zhu, L. X. Yang, and C. M. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  20. Q. Y. Zhu, X. F. Yang, L. X. Yang, and C. M. Zhang, “Optimal control of computer virus under a delayed model,” Applied Mathematics and Computation, vol. 218, no. 23, pp. 11613–11619, 2012. View at Publisher · View at Google Scholar
  21. L. P. Feng, X. F. Liao, H. Q. Li, and Q. Han, “Hopf bifurcation analysis of a delayed viral infection model in computer networks,” Mathematics and Computer Modeling, vol. 56, pp. 167–179, 2012. View at Publisher · View at Google Scholar
  22. L. X. Yang and X. F. Yang, “Propagation behavior of virus code in the situation that infected computers are connected to the Internet with possible probability,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 693695, 13 pages, 2012. View at Publisher · View at Google Scholar
  23. X. F. Yang and L. X. Yang, “Towards the epidemiological modeling of computer viruses,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 259671, 2012.
  24. Q. Y. Zhu, X. F. Yang, and J. G. Ren, “Modeling and analysis of the spread of computer virus,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, pp. 5117–5124, 2012. View at Publisher · View at Google Scholar
  25. C. Q. Gan, X. F. Yang, W. P. Liu, Q. Y. Zhu, and X. L. Zhang, “Propagation of computer virus under human intervention: a dynamical model,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 106950, 8 pages, 2012. View at Publisher · View at Google Scholar
  26. H. Yuan and G. Q. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH