DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.

As the root cause of illegal cyber activities, botnets are evolving continuously over the last two decades. Current researches on botnet command and control mechanism based on blockchain network suffer from high economic cost, single point of failure, and limited scalability. In this paper, we prese...

Full description

Bibliographic Details
Main Authors: Yi Zhong, Anmin Zhou, Lei Zhang, Fan Jing, Zheng Zuo
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2019-01-01
Series:PLoS ONE
Online Access:https://doi.org/10.1371/journal.pone.0226594
id doaj-a15251550b2349cca3917566ed6e6fed
record_format Article
spelling doaj-a15251550b2349cca3917566ed6e6fed2021-03-03T21:17:41ZengPublic Library of Science (PLoS)PLoS ONE1932-62032019-01-011412e022659410.1371/journal.pone.0226594DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.Yi ZhongAnmin ZhouLei ZhangFan JingZheng ZuoAs the root cause of illegal cyber activities, botnets are evolving continuously over the last two decades. Current researches on botnet command and control mechanism based on blockchain network suffer from high economic cost, single point of failure, and limited scalability. In this paper, we present DUSTBot, a novel P2P botnet model based on Bitcoin transactions to prepare for new cyber threats. Specifically, a covert, duplex, and low-cost command and control (C&C) channel in the Bitcoin network is presented in our work. DUSTBot uses the Bitcoin main network as the downstream channel while using the Bitcoin testnet as the upstream channel. Furthermore, the peer list exchange algorithm based on the Ethereum block hash proposed in this paper is effective against routing table poisoning attack and P2P botnet crawling. The robustness of DUSTBot against node removal is studied through constructing the botnet with a P2P simulator. We deploy the implementation of DUSTBot on cloud platforms to test its feasibility and performance. Moreover, the stealthiness of DUSTBot and the effectiveness of the proposed peer list exchange algorithm are evaluated. The results demonstrate the feasibility, performance, stealthiness, and robustness of DUSTBot. In the end, possible countermeasures are discussed to mitigate similar threats in the future.https://doi.org/10.1371/journal.pone.0226594
collection DOAJ
language English
format Article
sources DOAJ
author Yi Zhong
Anmin Zhou
Lei Zhang
Fan Jing
Zheng Zuo
spellingShingle Yi Zhong
Anmin Zhou
Lei Zhang
Fan Jing
Zheng Zuo
DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.
PLoS ONE
author_facet Yi Zhong
Anmin Zhou
Lei Zhang
Fan Jing
Zheng Zuo
author_sort Yi Zhong
title DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.
title_short DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.
title_full DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.
title_fullStr DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.
title_full_unstemmed DUSTBot: A duplex and stealthy P2P-based botnet in the Bitcoin network.
title_sort dustbot: a duplex and stealthy p2p-based botnet in the bitcoin network.
publisher Public Library of Science (PLoS)
series PLoS ONE
issn 1932-6203
publishDate 2019-01-01
description As the root cause of illegal cyber activities, botnets are evolving continuously over the last two decades. Current researches on botnet command and control mechanism based on blockchain network suffer from high economic cost, single point of failure, and limited scalability. In this paper, we present DUSTBot, a novel P2P botnet model based on Bitcoin transactions to prepare for new cyber threats. Specifically, a covert, duplex, and low-cost command and control (C&C) channel in the Bitcoin network is presented in our work. DUSTBot uses the Bitcoin main network as the downstream channel while using the Bitcoin testnet as the upstream channel. Furthermore, the peer list exchange algorithm based on the Ethereum block hash proposed in this paper is effective against routing table poisoning attack and P2P botnet crawling. The robustness of DUSTBot against node removal is studied through constructing the botnet with a P2P simulator. We deploy the implementation of DUSTBot on cloud platforms to test its feasibility and performance. Moreover, the stealthiness of DUSTBot and the effectiveness of the proposed peer list exchange algorithm are evaluated. The results demonstrate the feasibility, performance, stealthiness, and robustness of DUSTBot. In the end, possible countermeasures are discussed to mitigate similar threats in the future.
url https://doi.org/10.1371/journal.pone.0226594
work_keys_str_mv AT yizhong dustbotaduplexandstealthyp2pbasedbotnetinthebitcoinnetwork
AT anminzhou dustbotaduplexandstealthyp2pbasedbotnetinthebitcoinnetwork
AT leizhang dustbotaduplexandstealthyp2pbasedbotnetinthebitcoinnetwork
AT fanjing dustbotaduplexandstealthyp2pbasedbotnetinthebitcoinnetwork
AT zhengzuo dustbotaduplexandstealthyp2pbasedbotnetinthebitcoinnetwork
_version_ 1714817736142487552