Botnets for Scalable Management

With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets which are the major security threats in today's Internet where a botmaster can control several thousands of computers around the world. This is done although many hindernesses like firewalls, intrusion detection systems and other deployed security appliances to protect current networks. From a technical point of view, such an efficiency can be a benefit for network and service management. This paper describes a new management middleware based on botnets, evaluates its performances and shows its potential impact based on a parametric analytical model.

[1]  Biplab Sikdar,et al.  Modeling malware propagation in Gnutella type peer-to-peer networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[2]  Jarkko Oikarinen,et al.  Internet Relay Chat Protocol , 1993, RFC.

[3]  Craig Partridge,et al.  Smart packets: applying active networks to network management , 2000, TOCS.

[4]  Farnam Jahanian,et al.  The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.

[5]  K. N. Dollman,et al.  - 1 , 1743 .

[6]  Laurianne McLaughlin,et al.  Bot software spreads, causes new worries , 2004, IEEE Distributed Systems Online.

[7]  Christos Gkantsidis,et al.  Planet scale software updates , 2006, SIGCOMM '06.

[8]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[9]  Rolf Stadler,et al.  Real-time views of network traffic using decentralized management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[10]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[11]  Rolf Stadler,et al.  Management in telecom environments that are based on active networks , 2000, J. High Speed Networks.

[12]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[13]  Yechiam Yemini,et al.  Distributed management by delegation , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.

[14]  John Canavan,et al.  The evolution of malicious IRC bots , 2005 .

[15]  Jose Nazario,et al.  Defense and Detection Strategies against Internet Worms , 2003 .

[16]  Radu State,et al.  Probabilistic Management of Ad-Hoc Networks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[17]  Rolf Stadler,et al.  The impact of active networking technology on service management in a telecom environment , 1999, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).

[18]  Vinod Yegneswaran,et al.  An Inside Look at Botnets , 2007, Malware Detection.

[19]  Thomas M. Chen,et al.  A model and evaluation of distributed network management approaches , 2002, IEEE J. Sel. Areas Commun..

[20]  Radu State,et al.  Malware: a future framework for device, network and service management , 2007, Journal in Computer Virology.