Chord-based Quantum Botnet Research

In order to make the controller better to master the botnet, the traditional chord-based botnets ensure that all adjacent nodes can maintain the periodic communication so that the routing table of every node could keep accurate and efficient. The periodic communication behavior will also increase the risk of exposure of the traditional chord-based botnets. Once one of the peers is captured by network security device, more peers will be captured based on periodic communication behavior of chord-based botnets that leads to affect the botnet robustness. For the aforementioned problems in the traditional chord-based botnet, this paper will construct a quantum botnet control platform based on the improved B92 protocol. The in-depth analysis showed that the infected hosts in the chord-based quantum botnet can more quickly be increased, and can maintain a larger scale compared with the traditional chord-based botnet. So the chord-based quantum botnet owns better robustness and stability.

[1]  Jing Tao,et al.  A Novel IRC Botnet Detection Method Based on Packet Size Sequence , 2010, 2010 IEEE International Conference on Communications.

[2]  Nan Lu,et al.  Research of Botnet Detection Based on Multi-Stage Classifier , 2012 .

[3]  Fang Liu,et al.  Research of the combined botnet detection method based on Random Subspace , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[4]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[5]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  John Heidemann,et al.  Low-rate, flow-level periodicity detection , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[8]  Radu State,et al.  Towards malware inspired management frameworks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[9]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[10]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[11]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[12]  Seif Haridi,et al.  Efficient Broadcast in Structured P2P Networks , 2003, IPTPS.

[13]  Nguyen Ba An Quantum dialogue , 2004 .

[14]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[15]  Harald Weinfurter,et al.  Secure Communication with a Publicly Known Key , 2001 .

[16]  Xin Zhao,et al.  Research of botnet anomaly detection alogrithm based on private protocol , 2010, 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).