Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems

  • Dmitry P. Zegzhda
  • Tatiana V. Stepanova
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7531)


Nowadays one of the main means for computer attack organization are botnets. One of botnets’ goals is to break computer defense system and the goal of defense system is to neutralize botnets, staying resistant to its targeted attacks. There is lack of efficiency evaluation methods and models, which allow to compare how sustainable is defense system to targeted botnet attacks and vice versa. Proposed model allows to predict the result of interaction between botnet and defense system and can be used as base for building efficient distributed defense system, capable of protecting itself from botnet attacks.


botnet distributed defense system efficiency evaluation sustainability random graph 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dagon, D., Gu, G., Zou, C., Grizzard, J., Dwivedi, S., Lee, W., Lipton, R.: A Taxonomy of Botnet Structures. Botnet Detection 36 (2008)Google Scholar
  2. 2.
    Kotenko, I., Konovalov, A., Shorov, A.: Agent-based Modeling and Simulation of Botnets and Botnet Defense. Conference on Cyber Conflict, pp. 21–24. CCD COE Publications, Tallinn, Estonia (2010)Google Scholar
  3. 3.
    Bensoussan, A., Kantarcioglu, M., Hoe, S: A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 135–148. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Li, Z., Liao, Q., Striegel, A.: Botnet Economics: Uncertainty Matters. In: The 7th Workshop on the Economics of Information Security (2008) Google Scholar
  5. 5.
    Namestnikov, Y.: The Economics of Botnets,
  6. 6.
    Bellaıche, M., Gregoire, J.C.: Measuring Defense Systems Against Flooding Attacks. In: International Wireless Communications and Mobile Computing Conference IWCMC 2008, pp. 600–605 (2008)Google Scholar
  7. 7.
    Wu, Z., Dong, H., Liang, Y., McKay, R.I.: A Chromosome-based Evaluation Model for Computer Defense Immune Systems. In: Proceedings of the IEEE Congress on Evolutionary Computation, Canberra, Australia, pp. 1363–1369 (2003)Google Scholar
  8. 8.
    Dagon, D., Gu, G., Zou, C., Grizzard, J., Dwivedi, S., Lee, W., Lipton, R.: A Taxonomy of Botnets (2010) Google Scholar
  9. 9.
    Erdos, P., Renyi, A.: On random graphs. Publ. Math. Debrecen (1959) Google Scholar
  10. 10.
    Raygorodskyi, A.M.: Random Graph Models. In: MIPT Proceedings, T. 2, №4 (8), pp. 130-140 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Dmitry P. Zegzhda
    • 1
  • Tatiana V. Stepanova
    • 1
  1. 1.Saint-Petersburg State Polytechnical UniversityRussia

Personalised recommendations