Botnets IRC et P2P pour une supervision à large échelle

Alors que le nombre d'equipements a superviser ne cesse de croitre, le passage a l'echelle de la supervision des reseaux et services est un veritable enjeu. Un tel challenge semble avoir ete par le passe surmonte par les botnets connus actuellement pour etre une des principales menaces sur internet car un attaquant peut controler des milliers de machines. D'un point de vue technique, il serait tres utile de les utiliser dans le cadre de la supervision des reseaux. Cet article propose une nouvelle solution de supervision basee sur les botnets et evalue les performances associees de maniere a etablir un comparatif detaille des differents types de botnets utilisables pour la supervision.

[1]  Craig A. Schiller,et al.  Botnets: The Killer Web Applications , 2007 .

[2]  Laurianne McLaughlin,et al.  Bot software spreads, causes new worries , 2004, IEEE Distributed Systems Online.

[3]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[4]  Rolf Stadler,et al.  A navigation pattern for scalable Internet management , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[5]  Brent Byunghoon Kang,et al.  Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.

[6]  Radu State,et al.  Probabilistic Management of Ad-Hoc Networks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[7]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[8]  Larry L. Peterson,et al.  The design principles of PlanetLab , 2006, OPSR.

[9]  Rolf Stadler,et al.  Real-time views of network traffic using decentralized management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[10]  Vinod Yegneswaran,et al.  An Inside Look at Botnets , 2007, Malware Detection.

[11]  R. State,et al.  A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[12]  Denyse Baillargeon,et al.  Bibliographie , 1929 .

[13]  Radu State,et al.  Malware: a future framework for device, network and service management , 2007, Journal in Computer Virology.

[14]  Seif Haridi,et al.  Efficient Broadcast in Structured P2P Networks , 2003, IPTPS.

[15]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[16]  Iván Arce,et al.  An Analysis of the Slapper Worm , 2003, IEEE Secur. Priv..

[17]  Yechiam Yemini,et al.  Distributed management by delegation , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.

[18]  Craig Partridge,et al.  Smart packets: applying active networks to network management , 2000, TOCS.

[19]  Antonio F. Gómez-Skarmeta,et al.  DECA: A Hierarchical Framework for DECentralized Aggregation in DHTs , 2006, DSOM.

[20]  Biplab Sikdar,et al.  Modeling malware propagation in Gnutella type peer-to-peer networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[21]  Raouf Boutaba,et al.  Distributed pattern matching: a key to flexible and efficient P2P search , 2007, IEEE Journal on Selected Areas in Communications.

[22]  Ping Wang,et al.  An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.

[23]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.