Open Access iconOpen Access

ARTICLE

crossmark

Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Pulau Pinang, 11800, Malaysia

* Corresponding Author: Shankar Karuppayah. Email: email

Computers, Materials & Continua 2023, 75(2), 3375-3398. https://doi.org/10.32604/cmc.2023.036587

Abstract

The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission because the monitoring must care about many aspects simultaneously. Some aspects pertain to the existing monitoring approaches, some pertain to the nature of P2P networks, and some to counter the botnets, i.e., the anti-monitoring mechanisms. All these challenges should be considered in P2P botnet monitoring. To begin with, this paper provides an anatomy of P2P botnets. Thereafter, this paper exhaustively reviews the existing monitoring approaches of P2P botnets and thoroughly discusses each to reveal its advantages and disadvantages. In addition, this paper groups the monitoring approaches into three groups: passive, active, and hybrid monitoring approaches. Furthermore, this paper also discusses the functional and non-functional requirements of advanced monitoring. In conclusion, this paper ends by epitomizing the challenges of various aspects and gives future avenues for better monitoring of P2P botnets.

Keywords


Cite This Article

APA Style
Kabla, A.H.H., Anbar, M., Manickam, S., Alwan, A.A.A., Karuppayah, S. (2023). Monitoring peer-to-peer botnets: requirements, challenges, and future works. Computers, Materials & Continua, 75(2), 3375-3398. https://doi.org/10.32604/cmc.2023.036587
Vancouver Style
Kabla AHH, Anbar M, Manickam S, Alwan AAA, Karuppayah S. Monitoring peer-to-peer botnets: requirements, challenges, and future works. Comput Mater Contin. 2023;75(2):3375-3398 https://doi.org/10.32604/cmc.2023.036587
IEEE Style
A.H.H. Kabla, M. Anbar, S. Manickam, A.A.A. Alwan, and S. Karuppayah, “Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works,” Comput. Mater. Contin., vol. 75, no. 2, pp. 3375-3398, 2023. https://doi.org/10.32604/cmc.2023.036587



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1023

    View

  • 483

    Download

  • 0

    Like

Share Link