Advertisement

Botnets for Scalable Management

  • Jérôme François
  • Radu State
  • Olivier Festor
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4785)

Abstract

With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets which are the major security threats in today’s Internet where a botmaster can control several thousands of computers around the world. This is done although many hindernesses like firewalls, intrusion detection systems and other deployed security appliances to protect current networks. From a technical point of view, such an efficiency can be a benefit for network and service management. This paper describes a new management middleware based on botnets, evaluates its performances and shows its potential impact based on a parametric analytical model.

Keywords

Intrusion Detection System Node Failure Management Architecture Network Address Transla Worm Propagation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    McLaughlin, L.: Bot software spreads, causes new worries. IEEE Distributed Systems Online 5(6) (2004)Google Scholar
  2. 2.
    Oikarinen, J., Reed, D.: rfc 1459: Internet relay chat protocol (1993)Google Scholar
  3. 3.
    Canavan, J.: The evolution of malicious irc bots. In: VB 2005. Proceedings of the Virus Bulletin Conference, Dublin, Ireland (October 2005)Google Scholar
  4. 4.
    State, R., Festor, O.: Malware: a future framework for device, network and service management. Journal in Computer Virology 3(1), 51–60 (2007)CrossRefGoogle Scholar
  5. 5.
    How to Own the Internet in Your Spare Time, USENIX Association (2002)Google Scholar
  6. 6.
    Chen, T.M., Liu, S.S.: A model and evaluation of distributed network management approaches. Selected Areas in Communications, IEEE Journal on 20(4), 850–857 (2002)CrossRefGoogle Scholar
  7. 7.
    Ramachandran, K., Sikdar, B.: Modeling malware propagation in gnutella type peer-to-peer networks. In: International Parallel and Distributed Processing Symposium, 2006 (2006)Google Scholar
  8. 8.
    Nazario, J.: Defense and Detection Strategies against Internet Worms. Artech House, Inc., Norwood, MA, USA (2003)Google Scholar
  9. 9.
    Zou, C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis (2002)Google Scholar
  10. 10.
    Barford, P., Yegneswaran, V.: 1. In: An inside look at Botnets, Springer, Heidelberg (2006)Google Scholar
  11. 11.
    Cooke, E., Jahanian, F., Mcpherson, D.: The zombie roundup: Understanding, detecting, and disrupting botnets, pp. 39–44 (June 2005)Google Scholar
  12. 12.
    Goldszmidt, G., Yemini, Y.: Distributed management by delegation. In: 15th International Conference on Distributed Computing Systems, IEEE Computer Society Press, Los Alamitos (1995)Google Scholar
  13. 13.
    SNMP, Research: The mid-level manager (accessed on 07/30/07), http://www.snmp.com/products/mlm.html
  14. 14.
    Schwartz, B., Jackson, A.W., Strayer, W.T., Zhou, W., Rockwell, R.D., Partbridge, C.: Smart packets: applying active networks to network management. ACM Transactions on Computer Systems 18(1), 67–88 (2000)CrossRefGoogle Scholar
  15. 15.
    Brunner, M., Stadler, R.: The impact of active networking technology on service management in a telecom environment. In: IFIP/IEEE International Symposium on Integrated Network Management, Boston (1999)Google Scholar
  16. 16.
    Brunner, M., Stadler, R.: Management in telecom environments that are based on active networks. Journal of High Speed Networks (2001)Google Scholar
  17. 17.
    Lim, K.S., Stadler, R.: Real-time views of network traffic using decentralized management. In: 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  18. 18.
    Gkantsidis, C., Karagiannis, T., VojnoviC, M.: Planet scale software updates. SIGCOMM Comput. Commun. Rev. 36(4), 423–434 (2006)CrossRefGoogle Scholar
  19. 19.
    Badonnel, R., State, R., Festor, O.: Probabilistic management of ad-hoc networks. In: NOMS 2006. 10th IEEE/IFIP Network Operations and Management Symposium, IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  20. 20.
    Ohno, H., Shimizu, A.: Improved network management using nmw (network management worm) system. In: Proceedings of INET 1995, Honolulu, Hawaii (June 27-30, 1995)Google Scholar
  21. 21.
    Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2007

Authors and Affiliations

  • Jérôme François
    • 1
  • Radu State
    • 1
  • Olivier Festor
    • 1
  1. 1.MADYNES - INRIA Lorraine, CNRS, Nancy-UniversitéFrance

Personalised recommendations