A percolation-based recovery mechanism for bot infected P2P cloud

Execution of any recovery procedure in compromised nodes of a Cloud should aim at covering as many nodes as possible in a given time. The authors propose an innovative approach using the concept of percolation centrality to spread the execution of a recovery procedure across adjacent nodes in a P2PCloud. Compromised networks can be large since botnets and malware infections use the advantage of the internet to spread rapidly. Using percolation centrality to choose a node from where to begin, the recovery procedure runs in parallel in different nodes which can be reached from a chosen node and spreads fast.

[1]  M. Newman,et al.  Percolation and epidemics in a two-dimensional small world. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  Herbert Bos,et al.  SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.

[3]  M. Barthelemy Betweenness centrality in large complex networks , 2003, cond-mat/0309436.

[4]  Sven Dietrich,et al.  P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[5]  M. Newman,et al.  Epidemics and percolation in small-world networks. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[6]  M. Prokopenko,et al.  Percolation Centrality: Quantifying Graph-Theoretic Impact of Nodes during Percolation in Networks , 2013, PloS one.

[7]  Özalp Babaoglu,et al.  Design and implementation of a P2P Cloud system , 2012, SAC '12.

[8]  F. Brazier,et al.  The Future of Cloud-based Botnets ? , 2011 .

[9]  C. Schindelhauer,et al.  Random Graphs for Peer-to-Peer Overlays , 2007 .

[10]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[11]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[12]  Yilun Shang,et al.  Localized recovery of complex networks against failure , 2016, Scientific Reports.

[13]  H E Stanley,et al.  Recovery of Interdependent Networks , 2015, Scientific Reports.

[14]  Indrajit Banerjee,et al.  Goal Based Threat Modeling for Peer-to-Peer Cloud☆ , 2016 .

[15]  Frances M. T. Brazier,et al.  Botclouds - The Future of Cloud-based Botnets? , 2011, CLOSER.

[16]  Béla Bollobás,et al.  Handbook of large-scale random networks , 2008 .

[17]  Harry Eugene Stanley,et al.  Percolation of localized attack on complex networks , 2014, ArXiv.

[18]  H. Stanley,et al.  Spontaneous recovery in dynamical networks , 2013, Nature Physics.

[19]  Felix C. Freiling,et al.  On Botnets That Use DNS for Command and Control , 2011, 2011 Seventh European Conference on Computer Network Defense.

[20]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[21]  M. Newman Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.