Font Size: a A A

Research And Implementation On The Architecture Of The Botnet

Posted on:2017-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:L YuFull Text:PDF
GTID:2348330512988978Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the development of computer network technology and the application of Internet terminal, the network is facing increasing security threats. As one of the most serious network security threats, botnet has gradually caused widespread concern in the society. To predict and design botnet has become an effective method to prevent network security threats. Therefore, it is important to anlalyze botnet.Based on this background, the thesis does a research on botnet. At the beginning of the thesis, the definition of botnet is elaborated as well as the development history and the advances on the study of botnet, the current major topological structures are analyzed and the mainstream technologies of botnets building are studied. And then a kind of botnet is proposed and implemented. The thesis uses the techniques of covert communication mechanism based on the command authentication, individualized encryption and ICMP protocol, the central server hidden mechanism combined with the Fast-Flux and network springboard technology, and the P2P-based command forwarding mechanism. A hybrid P2P-based botnet prototype system is finally implemented, which includes covert communication module, central server hidden module, routing updates module, command releasing module and new node joining module.Finally, we test the functions of the proposed botnet under the Linux experimental platform and analyze the results of the test, which demonstrates the system fully satisfies the system design requirement. Hence, this system can be used to prevent future potential botnets.
Keywords/Search Tags:botnet, P2P, Fast-Flux, ICMP
PDF Full Text Request
Related items