An Advanced Hybrid Peer-to-Peer Botnet
Ping Wang Sherri Sparks Cliff C. Zou
School of Electrical Engineering and Computer Science
University of Central Florida, Orlando, FL
{pwang, ssparks, czou}@cs.ucf.edu
Abstract— A “botnet” consists of a network of compromised
computers controlled by an attacker (“botmaster”). Recently
botnets have become the root cause of many Internet attacks.
To be well prepared for future attacks, it is not enough to study
how to detect and defend against the botnets that have appeared
in the past. More importantly, we should study advanced botnet
designs that could be developed by botmasters in the near future.
In this paper, we present the design of an advanced hybrid peer-
to-peer botnet. Compared with current botnets, the proposed
botnet is harder to be shut down, monitored, and hijacked. It
provides robust network connectivity, individualized encryption
and control traffic dispersion, limited botnet exposure by each
bot, and easy monitoring and recovery by its botmaster. Possible
defenses against this advanced botnet are suggested.
I. INTRODUCTION
In the last several years, Internet malware attacks have
evolved into better organized and more profit-centered endeav-
ors. Email spam, extortion through denial-of-service attacks
[1], and click fraud [2] represent a few examples of this
emerging trend. “Botnets” are a root cause of these problems
[3], [4], [5]. A “botnet” consists of a network of compromised
computers (“bots”) connected to the Internet that is controlled
by a remote attacker (“botmaster”) [6], [5]. Since a botmaster
could scatter attack tasks over hundreds or even tens of
thousands of computers distributed across the Internet, the
enormous cumulative bandwidth and large number of attack
sources make botnet-based attacks extremely dangerous and
hard to defend against.
Compared to other Internet malware, the unique feature of a
botnet lies in its control communication network. Most botnets
that have appeared until now have had a common centralized
architecture. That is, bots in the botnet connect directly to
some special hosts (called “command-and-control” servers, or
“C&C” servers). These C&C servers receive commands from
their botmaster and forward them to the other bots in the
network. From now on we will call a botnet with such a control
communication architecture a “C&C botnet”. Fig. 1 shows the
basic control communication architecture for a typical C&C
botnet (in reality, a C&C botnet usually has more than two
C&C servers). Arrows represent the directions of network
connections.
As botnet-based attacks become popular and dangerous,
security researchers have studied how to detect, monitor, and
defend against them [3], [6], [1], [4], [7], [5]. Most of the
current research has focused upon the C&C botnets that have
appeared in the past, especially Internet Relay Chat (IRC)
based botnets. It is necessary to conduct such research in
order to deal with the threat we are facing today. However,
it is equally important to conduct research on advanced botnet
designs that could be developed by attackers in the near future.
Otherwise, we will remain susceptible to the next generation
of internet malware attacks.
From a botmaster’s perspective, the C&C servers are the
fundamental weak points in current botnet architectures. First,
a botmaster will lose control of his or her botnet once the
limited number of C&C servers are shut down by defenders.
Second, defenders could easily obtain the identities (e.g., IP
addresses) of all C&C servers based on their service traffic to
a large number of bots [7], or simply from one single captured
bot (which contains the list of C&C servers). Third, an entire
botnet may be exposed once a C&C server in the botnet is
hijacked or captured by defenders [4]. As network security
practitioners put more resources and effort into defending
against botnet attacks, hackers will develop and deploy the
next generation of botnets with a different control architecture.
A. Current P2P Botnets and Their Weaknesses
Considering the above weaknesses inherent to the cen-
tralized architecture of current C&C botnets, it is a natural
strategy for botmasters to design a peer-to-peer (P2P) control
mechanism into their botnets. In the last several years, botnets
such as Slapper [8], Sinit [9], Phatbot [10] and Nugache [11]
have implemented different kinds of P2P control architectures.
They have shown several advanced designs. For example,
in order to remove the bootstrap process which is easily
exploited by defenders to shut down a botnet, the Slapper
worm builds a list of known bots for each infected computer
during propagation [8]. Sinit likewise lacks a bootstrap process
and uses public key cryptography for update authentication
[9]. Nugache attempts to thwart detection by implementing an
encrypted/obsfucated control channel [11].
Nevertheless, simply migrating available P2P protocols will
not generate a sound botnet, and the P2P designs in those
botnets appeared before are not mature and have many weak-
nesses. A Sinit bot uses random probing to find other Sinit
bots to communicate with. This results in poor connectivity for
the constructed botnet and easy detection due to the extensive
probing traffic [9]. Phatbot utilizes Gnutella cache servers
for its bootstrap process. This also makes the botnet easy
to shut down. In addition, its underlying WASTE peer-to-
peer protocol is not scalable across a large network [10].
Nugache’s weakness lies in its reliance on a seed list of 22
IP addresses during its bootstrap process [11]. Slapper fails to