ENSC 427: Communication Networks

Spring 2023 - Group 1

Jacob Forrest - 301360304

Boris Perdija - 301339378



Investigation into Wireless Device Botnets

Abstract

 A botnet is a network of compromised computers controlled by a central entity for malicious purposes. A botnet can be used to engage in malicious activities such as sending spam, launching DDoS attacks, and stealing information. The growing number of Internet of Things (IoT) devices, such as smart home appliances, security cameras, and medical devices, has provided attackers with a large pool of vulnerable devices to exploit. These devices often have weak security measures or outdated firmware, making them an easy target for attackers to compromise and use as part of botnets to launch DDoS attacks. The goal of this project is to implement a botnet in NS-3 comprised of various devices connected to wireless networks and observe its effectiveness at executing DDoS attacks.

References

 [1] Vishwakarma, R., Jain, A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun Syst 73, 3-25 (2020). https://doi.org/10.1007/s11235-019-00599-z

 [2] V. Buriachok and V. Sokolov, Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks, in IEEE Transactions on Networking, vol. 28, no. 3, pp. 1447-1458, June 2020, doi: 10.1109/TNET.2020.2974776.

 [3] Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H. H., Radford, A., & Sivaraman, V. (2017, July). Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 46-51). Association for Computing Machinery. https://doi.org/10.1145/3098243.3098264

 [4] J. He, Y. Yang, X. Wang, and Z. Tan, Adaptive traffic sampling for P2P botnet detection, International Journal of Network Management, vol. 27, no. 5. Wiley, p. e1992, Aug. 04, 2017. doi: 10.1002/nem.1992.

 [5] R. Chen, W. Niu, X. Zhang, Z. Zhuo, and F. Lv, An Effective Conversation-Based Botnet Detection Method, Mathematical Problems in Engineering, vol. 2017. Hindawi Limited, pp. 1-9, 2017. doi: 10.1155/2017/4934082.

 [6] S. GarcĂ­a, A. Zunino, and M. Campo, Survey on network-based botnet detection methods, Security and Communication Networks, vol. 7, no. 5. Wiley, pp. 878-903, Jun. 21, 2013. doi: 10.1002/sec.800.

 [7] L. Wenke, Botnet detection : countering the largest security threat. Springer, 2008.

 [8] D. Zhao et al., Botnet detection based on traffic behavior analysis and flow intervals, Computers & Security, vol. 39. Elsevier BV, pp. 2-16, Nov. 2013. doi: 10.1016/j.cose.2013.04.007.