Next Article in Journal
Heracles: A Context-Based Multisensor Sensor Data Fusion Algorithm for the Internet of Things
Next Article in Special Issue
A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service
Previous Article in Journal
Social Capital on Social Media—Concepts, Measurement Techniques and Trends in Operationalization
Previous Article in Special Issue
SlowTT: A Slow Denial of Service against IoT Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Botnet Defense System: Concept, Design, and Basic Strategy †

Graduate School of Sciences and Technology for Innovation, Yamaguchi University, Ube 755-8611, Japan
This paper is an extended version of our paper published in Yamaguchi, S. Botnet Defense System: Concept and Basic Strategy. In Proceedings of the IEEE 38th International Conference on Consumer Electronics (IEEE ICCE 2020), Las Vegas, NV, USA, 5 January 2020.
Submission received: 8 October 2020 / Revised: 30 October 2020 / Accepted: 2 November 2020 / Published: 4 November 2020
(This article belongs to the Special Issue Security and Privacy in the Internet of Things)

Abstract

:
This paper proposes a new kind of cyber-security system, named Botnet Defense System (BDS), which defends an Internet of Things (IoT) system against malicious botnets. The concept of BDS is “Fight fire with fire”. The distinguishing feature is that it uses white-hat botnets to fight malicious botnets. A BDS consists of four components: Monitor, Strategy Planner, Launcher, and Command and Control (C&C) server. The Monitor component watches over a target IoT system. If the component detects a malicious botnet, the Strategy Planner component makes a strategy against the botnet. Based on the planned strategy, the Launcher component sends white-hat worms into the IoT system and constructs a white-hat botnet. The C&C server component commands and controls the white-hat botnet to exterminate the malicious botnet. Strategy studies are essential to produce intended results. We proposed three basic strategies to launch white-hat worms: All-Out, Few-Elite, and Environment-Adaptive. We evaluated BDS and the proposed strategies through the simulation of agent-oriented Petri net model representing the battle between Mirai botnets and the white-hat botnets. This result shows that the Environment-Adaptive strategy is the best and reduced the number of needed white-hat worms to 38.5% almost without changing the extermination rate for Mirai bots.

1. Introduction

The Internet of Things (IoT) is a fundamental technology which brings about radical change in modern society, while being targeted as a springboard for cyber-attacks. A new kind of malware called Mirai [1] infects IoT devices and turns them into bots. The network of bots (botnet) becomes a springboard for Distributed Denial-of-Service (DDoS) attacks. In fact, Mirai botnet’s DDoS attacks came true in September 2016 and knocked out Amazon, Twitter, and other major sites. IoT devices are explosively increasing and most of them are vulnerable. Since Mirai makes such IoT devices a hotbed, Mirai botnet’s DDoS attacks tend to become massive and disruptive [2]. Four years have passed since Mirai appeared, but Mirai and its variants are still raging all over the world [3].
Mirai penetrates only to the dynamic memory of a device, therefore we can delete Mirai by rebooting the infected device [4]. However, Moffitt [5] reported that Mirai can reinfect the device within minutes unless the vulnerability is patched. IoT devices are explosively increasing. According to the Cisco’s white book [6], more devices were connected to the Internet than people by the late 2000s and the number is predicted to reach 30 billion by 2023. Also, IoT devices are vulnerable. This is because they do not have resources to run security functions and their vendors may sacrifice security in the price competition and/or their rush to market. We must fix such vulnerabilities, but workforce tactics are not practical because of the huge number of devices. Thus, it is necessary to drastically increase the ability to defend IoT systems against Mirai.
Yamaguchi [7] has proposed to use worms to defend IoT systems by imitating the way that attackers use malware to attack. He defined a white-hat worm as a worm which drives out malicious botnets and then deletes itself. The worm is characterized by two attributes: secondary infection possibility and lifespan. Secondary infection enables the worm to regain the device from Mirai. Lifespan forces the worm to destruct itself and avoid staying on the recovered device. He regarded the battle between Mirai and the white-hat worm as a multi-agent system and expressed it with agent-oriented Petri nets, called PN 2 [8]. The simulation result of the PN 2 model showed the effectiveness of the worm. However, there is no discussion on how to systematically launch the white-hat worm in response to Mirai’s infection situation.
In this paper, we propose a new kind of cyber-security system, named Botnet Defense System (BDS). In imitation of “Fight fire with fire”, we advocate a concept of “Fight botnet with botnet”. BDS is a system that realizes this concept. Next we describe the system organization and operations of BDS. BDS strategically operates the white-hat worm and its botnet in response to Mirai’s infection situation. Also, we propose a basic strategy for launching white-hat worms. Then we evaluate the effect of the strategy through the simulation with the PN 2 model.
The rest of this paper is organized as follows: Section 2 surveys the related work. Section 3 gives the design of BDS and basic strategies. Section 4 presents the effectiveness of BDS and the proposed strategies through the simulation evaluation with the PN 2 model. Section 5 summarizes our key points and gives future work.

2. Related Work

2.1. Botnet and Mitigation Methods

Bots and botnets are not new technologies. A bot is a program that performs predefined tasks according to commands sent through the Internet. Some bots are good such as chat bots and trader bots, while others are bad such as spam bots and DDoS bots. A typical example of DDoS bots is Mirai. Mirai is a kind of worm that spreads copies of itself to IoT devices. Mirai infects IoT devices and turns them into bots. The network of bots (botnet) is used by attackers as a springboard for DDoS attacks [9].
Ogu et al. [10] surveyed the current status of the botnet threat. The survey covers the typology of botnets and their owners, the structure and life cycle of botnets, botnet attack modes and control architectures, existing countermeasure solutions and limitations, as well as the prospects of a botnet threat.
Bezerra et al. [11] proposed a host-based approach to detect IoT botnets, named IoTDS (Internet of Things Detection System). IoTDS monitors a device and collects its CPU use and temperature, memory consumption, and the number of processes. If the device detects any anomaly from the data, an alert of botnet detection is sent to the central server.
Manso et al. [12] designed and implemented a Software-Defined Intrusion Detection System. The system includes an IDS that automatically detects several DDoS attacks. Once the IDS detects an attack, it notifies a Software-Defined Networking controller to control networking devices. The system can timely detect a botnet exploitation, mitigate malicious traffic, and protect normal traffic. However, the above-mentioned systems do nothing for the detected botnets.

2.2. White-Hat Worm

A white-hat worm is generally defined as a worm created for well-intentioned purposes. One of well-known white-hat worms is Hajime [13]. Like Mirai, Hajime infects IoT devices and turns them into bots. However, there is neither code nor capability for DDoS attacks in Hajime. Moreover, Hajime actually protects the devices against Mirai by blocking the ports that Mirai uses to infect. However, Hajime continues to stay at the infected device even after completing the defense against Mirai. Therefore, Hajime may be said to be gray-hat.
Molesky et al. [14] have proposed a new perspective in the use of white-hat worm technology. The point is that not only the manufacturers but also governments can use the technology to fix critical vulnerabilities of IoT devices. A white-hat worm infects the vulnerable device and applies the appropriate patch. Molesky states in Ref. [14] that legally, this could be enacted by including explicit terms within the Terms and Conditions agreement at the time of purchase and creates a contract with the consumer allowing for these actions to occur legally and without liability to the company. This suggests white-hat worm technology is applicable in practice. However, the role of the white-hat worm is restricted to fix vulnerabilities, not to exterminate malicious botnet.
Yamaguchi [7] defined a worm that drives out the Mirai botnet and deletes itself as a white-hat worm. It is characterized by two attributes: secondary infection possibility and lifespan. Secondary infection possibility is a probability that the worm can reinfect the devices infected by Mirai. This enables the worm to regain the device from Mirai. Lifespan is a temporal constraint that the worm can exist at a device. It forces the worm to destruct itself and to avoid staying on the device recovered. These characteristics make the white-hat worm radically different from Hajime.

2.3. PN 2 Model

Yamaguchi regarded the battle between Mirai and the white-hat worm as a multi-agent system and expressed it with agent-oriented Petri nets, called PN 2 . For the detail of Petri nets and PN 2 , refer to Refs. [8,9]. A PN 2 is intuitively a Petri net (known as environment net) whose tokens are again Petri nets (known as agent nets). Figure 1 shows a PN 2 model representing the battle. Figure 1a–e respectively show the agent nets representing devices device1, device3, Mirai, device device2 and the white-hat worm. Figure 1f shows the environment net representing an IoT system composed of three network nodes. Each place drawn as ◯ represents a network node. Each token drawn as Information 11 00516 i001 represents an agent such as Mirai, the white-hat worm, and an IoT device, which corresponds to one of the agent nets. Each node has one device. Device device1 at place P1 is infected by Mirai. Device device2 at place P2 is normal. Device device3 at place P3 is infected by the white-hat worm. Each transition drawn as □ represents an action of one agent or an interaction among two or more agents. Whether an action can occur or not is decided based on the state of related agents. Red transitions of the environment net shown in Figure 1f show that they can occur. Let us induce the action represented by transition T214. This action means that the white-hat worm at P3 produces a copy of itself into P2, and the copy infects device2. Figure 2 shows the state after this action occurs. Please note that the action of transition T113 became disabled in order to occur. This means that the worm at P2 protects device2 from Mirai at P1.
Yamaguchi performed simulation evaluation with a tool known as PN2Simulator [15]. In Ref. [7], he revealed the following properties between a white-hat worm’s capability (lifespan , secondary infection possibility ρ ) and its effect: (i) if is short, the worm becomes extinct in course of time; (ii) if ρ is high, the worm is effective regardless of ; and (iii) if is long, the worm is effective even if ρ is low. However, there is no discussion about how to systematically launch the white-hat worm in response to Mirai’s infection situation.

3. Botnet Defense System

3.1. Concept and Design

We propose a cyber-security system, named Botnet Defense System (BDS), that defends IoT systems against malicious botnets. Attackers use botnets to attack IoT systems. Imitating this, defenders also might be able to use botnets to defend the systems. This so-called “Fight fire with fire” is the concept of BDS. BDS realizes this concept and enables defenders to fight malicious botnets with white-hat botnet.
The distinct feature of BDS is to make use of the white-hat worm and its botnet. This can innovatively increase the defense ability because the white-hat worm and its botnet can protect devices from malicious botnet and drive it out instead of humans having to do that. However, since they are autonomous agents, we need to manage them to produce appropriate effect. BDS plans a strategy in response to malicious botnet’s type and infection situation and carries out the management according to the strategy.
We adopt component-based architecture to design BDS. This enables us to research and develop the functionalities using components as a unit and further to realize a required BDS quickly and flexibly by combining components. A BDS consists of four components: monitor, strategy planner, worm launcher, and command and control (C&C) server. The BDS operates according to the following procedure (See Figure 3):
1°
The monitor component watches over a specified IoT system. This activity itself may be done through white-hat worm. If detecting a malicious botnet, it investigates and reports the information such as the botnet type and its infection situation.
2°
The strategy planner component makes a strategy against the malicious botnet based on the information reported by the monitor component.
3°
The worm launcher component sends white-hat worms into the IoT system based on the strategy and constructs a white-hat botnet.
4°
The C&C server component commands and controls the white-hat botnet to drive out the malicious botnet.
Please note that this procedure is executed repeatedly.

3.2. Strategies

The BDS uses a white-hat worm to build its botnet and then uses it to drive out the malicious botnet. The result would vary depending on the strategy adopted by the BDS. Therefore, strategy studies are essential to produce intended results. Strategies can be roughly divided into two categories: launch strategies and C&C strategies. Launch strategies specify how to launch a white-hat worm to build its botnet. C&C strategies specify how to command and control the botnet to drive out malicious botnets. In this paper, we focus on the launch strategies because their result influences planning of the C&C strategies.
We first formalize the launch strategies. Once the monitor component detects a malicious botnet, it reports the information such as its type and infection situation. We assume that the malicious botnet is Mirai and its infection situation is grasped by its infection rate R M i r a i . R M i r a i is given as
R M i r a i = # M i r a i # n o d e s
where # n o d e s is the number of network nodes, # M i r a i is the number of nodes infected by Mirai, i.e., the number of Mirai bots. The strategy planner component makes a launch strategy based on the value of R M i r a i , the specification of the targeted IoT system, and the capability of an available the white-hat worm. An IoT system’s specification is given as # n o d e s , the network topology N t o p o l o g y { Grid , Tree , } , and the network density N d e n s i t y . N d e n s i t y is given as
N d e n s i t y = # A C # P C = 2 · # A C # n o d e s ( # n o d e s 1 )
where # A C is the number of actual connections and # P C is the number of potential connections. A white-hat worm’s capability is given as the worm’s lifespan and secondary infection possibility ρ .
We give a formal definition of a launch strategy as follows.
Definition 1 
(Launch Strategy). Let R M i r a i be a Mirai’s infection rate, ( # n o d e s , N t o p o l o g y , N d e n s i t y ) be an IoT system’s specification, and ( , ρ ) be a white-hat worm’s capability. Let # W h i t e be the number of the white-hat worm to launch. A launch strategy L is a mapping such that
L : ( R M i r a i , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) , ( , ρ ) ) # W h i t e .

3.2.1. All-Out Launch Strategy

In the beginning, we give a launch strategy called All-Out as a baseline in strategy studies. This is to launch as many white-hat worms as possible. The formal definition is given as follows.
Strategy 1 
(All-Out Launch Strategy L A l l O u t ). For a Mirai’s infection rate R M i r a i , an IoT system’s specification ( # n o d e s , N t o p o l o g y , N d e n s i t y ) and a white-hat worm’s capability ( , ρ ) , the All-Out launch strategy L A l l O u t is a mapping such that
L A l l O u t : ( R M i r a i , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) , ( , ρ ) ) # n o d e s R M i r a i # n o d e s = # n o d e s # M i r a i
This launch strategy L A l l O u t is to dispatch the white-hat worm to all the nodes other than Mirai bots. Figure 4 shows an application example of L A l l O u t . This IoT system has a grid-topology network composed of 5 × 5 = 25 nodes, where the network density is 13.3% (= ( 2 × 40 ) / ( 25 × 24 ) ), i.e., its specification ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Grid , 13.3 % ) . Figure 4a shows the state when the BDS detected a Mirai botnet. There are six Mirai bots, i.e., # M i r a i = 6 . According to L A l l O u t , the number of the white-hat worm to launch is calculated as # W h i t e = # n o d e s # M i r a i = 19 . The BDS dispatches the worm to 19 non-bot nodes as shown in Figure 4b.
Obviously, the number ( # n o d e s # M i r a i ) of Equation (4) is the upper limit to launch. Therefore, when the BDS adopts this strategy, we can expect the white-hat worm and its botnet to expose the maximum effect against Mirai botnet. However, L A l l O u t forces the BDS to launch the upper number of the white-hat worm regardless of the Mirai’s infection situation, the IoT system’s specification, and the worm’s capability. Extra white-hat worms would place an unnecessary load on the IoT system. A too-large white-hat botnet may make control difficult because all the network nodes may be not always observable and controllable.

3.2.2. Few-Elite Launch Strategy

Let us take the white-hat worm’s capability (lifespan , secondary infection possibility ρ ) into consideration. As mentioned in Section 2.3, there are two conditions such that the worm becomes effective. One is ρ is high. The other is is long. We propose a launch strategy called Few-Elite by introducing these conditions.
Strategy 2 
(Few-Elite Launch Strategy L F e w E l i t e ). For a Mirai’s infection rate R M i r a i , an IoT system’s specification ( # n o d e s , N t o p o l o g y , N d e n s i t y ) and a white-hat worm’s capability ( , ρ ) , the Few-Elite strategy L F e w E l i t e is a mapping such that
L F e w E l i t e : ( R M i r a i , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) , ( , ρ ) ) # e l i t e i f   ρ + α > θ # n o d e s R M i r a i # n o d e s o t h e r w i s e
where # e l i t e is the number of the worm to launch when its capability is sufficient, α is a weight coefficient and θ is a threshold.
This launch strategy L F e w E l i t e is to launch only a limited number # e l i t e if the worm has a high secondary infection possibility or a long lifespan. Otherwise, it launches as many worms as possible in the same as L A l l O u t . Figure 5 shows an application example of L F e w E l i t e . The IoT system used in this example and its infection situation are the same as that of Figure 4a. Assume that # e l i t e = 5 , α = 20 and θ = 120 . Let an available worm’s capability be ( ρ = 75 % , = 3 s t e p s ) . According to L F e w E l i t e , the number of the white-hat worm to launch is calculated as # W h i t e = # e l i t e = 5 because ρ + α = 75 + 20 × 3 > θ = 120 holds. The BDS launches only five worms as shown in Figure 5a. As another case, assume that the worm’s capability is ( ρ = 25 % , = 3 s t e p s ) . According to L F e w E l i t e , # W h i t e is calculated as # n o d e s R M i r a i # n o d e s = # n o d e s # M i r a i = 19 because ρ + α = 25 + 20 × 3 θ = 120 holds. The BDS launches the upper number in the same as L A l l O u t as shown in Figure 5b.

3.2.3. Environment-Adaptive Strategy

Mirai and the white-hat worm use the network of an IoT system to spread themselves. Therefore, their spread is influenced by the network. We should introduce the influence to a strategy. The IoT system’s specification is given as (Number of network nodes # n o d e s , Network topology N t o p o l o g y , Network density N d e n s i t y ). We focus on N d e n s i t y . This is because some networks have a different topology but the same density, and Ref. [7] indicated that # n o d e s is not important than the worm’s capability. We propose a launch strategy called Environment-Adaptive to compensate for the influence from the network.
Strategy 3 
(Environment-Adaptive Launch Strategy L E n v A d a p t i v e ). For a Mirai’s infection rate R M i r a i , an IoT system’s specification ( # n o d e s , N t o p o l o g y , N d e n s i t y ) and a white-hat worm’s capability ( , ρ ) , the Environment-Adaptive strategy L E n v A d a p t i v e is a mapping such that
L E n v A d a p t i v e : ( R M i r a i , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) , ( , ρ ) ) # e l i t e i f   ρ + α > θ   a n d   N d e n s i t y > β 2 # n o d e s # n o d e s R M i r a i # n o d e s o t h e r w i s e
where 2 # n o d e s is the minimum density of connected networks composed of # n o d e s nodes and β is a weight coefficient.
This launch strategy L E n v A d a p t i v e is to launch # e l i t e worms if the worm’s capability is sufficient and only if the network density is not low. Otherwise, the upper number is launched. Figure 6 shows an application example of L E n v A d a p t i v e . Let us consider two IoT systems. They have the same number of nodes ( # n o d e s = 25 ) but have different network topology. One has the grid topology as shown in Figure 6a. The other has the tree topology as shown in Figure 6b. Let α = 20 and θ = 120 as well as the previous example. Assume that an available worm’s capability is ( ρ = 75 % , = 3   steps ) . This worm has a sufficient capability because ρ + α = 75 + 20 × 3 > θ = 120 holds. Assume that # e l i t e = 5 and β = 1.2 . The threshold of network density is calculated as β 2 # n o d e s = 9.6 % . First, let us consider the case of the grid topology. Since # A C = 2 # n o d e s ( # n o d e s 1 ) = 40 , N d e n s i t y is calculated as 2 × 40 25 × 24 = 13.3 % by Equation (2). According to L E n v A d a p t i v e , # W h i t e is calculated as # e l i t e = 5 because the worm’s capability is sufficient and N d e n s i t y = 13.3 % > β 2 # n o d e s = 9.6 % . The BDS launches only five worms as shown in Figure 6a. Next, let us consider the case of the tree topology. Since # A C = # n o d e s 1 = 24 , N d e n s i t y is calculated as 2 × 24 25 × 24 = 8.0 % by Equation (2). According to L E n v A d a p t i v e , # W h i t e is calculated as the upper number because N d e n s i t y = 8.0 % β 2 # n o d e s = 9.6 % . Even though the worm has sufficient capability, the BDS launches the upper number to compensate the influence from the network as shown in Figure 6b.

4. Simulation Evaluation

We evaluated BDS and the proposed launch strategies through the simulation of the PN 2 model representing the battle between Mirai botnet and the white-hat botnet.

4.1. Simulation

We performed a simulation experiment to evaluate BDS and the strategies with PN2Simulator [15]. The PN 2 model described in Section 2.3 can represent the dynamic behavior under various conditions. Figure 7 shows how to translate an IoT network into a PN 2 model. This network’s specification is ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Tree , 8.0 % ) . Let us examine the 9th node. This node connects to four nodes: the 4th, 8th, 10th and 14th nodes. Each colored connection corresponds to the part of the PN 2 with the same color. Next, let us examine the 19th node. This node does not connect to the 14th node. Therefore, this would be translated into the model without the part colored in red.
We used R M i r a i as the index to evaluate BDS and its strategies. The value of R M i r a i varies with the progress of simulation. Therefore, we write it as a function R M i r a i ( t ) of step number t, and set t = 0 when a BDS detects a Mirai botnet and launches the white-hat worms. For example, R M i r a i ( 0 ) denotes Mirai’s infection rate when the BDS detects the Mirai botnet. R M i r a i ( 1000 ) denotes Mirai’s infection rate after 1000 steps. In the same way, we define # M i r a i ( t ) and # W h i t e ( t ) , where # W h i t e is the number of nodes infected by the white-hat worm, i.e., the number of the white-hat bots.
We measured R M i r a i ( 1000 ) by changing the following parameters.
  • # M i r a i ( 0 ) = 6 or 12, i.e., R M i r a i ( 0 ) = 24.0 % or 48.0 %
  • # W h i t e ( 0 ) = 1 , 3 , 5 , 7 , 13 (or 19 if # M i r a i ( 0 ) = 6 )
  • The distribution of Mirai and white-hat bots at step 0 were decided at random
  • The IoT system’s specification:
    Network size # n o d e s = 25
    Network topology N t o p o l o g y = Grid or Tree, i.e., Network density N d e n s i t y = 13.3 % or 8.0 %
  • The white-hat worm’s capability:
    Lifespan = 1 , 3 , or 5 steps, where the delay time δ until rebooting = 11 steps
    Secondary infection possibility ρ = 0 , 25 , 50 , 75 , or 100 %
  • L F e w E l i t e :
    ( R M i r a i , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) , ( , ρ ) ) 5 if   ρ + 20 > 120 # n o d e s R M i r a i # n o d e s otherwise
  • L E n v A d a p t i v e :
    ( R M i r a i , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) , ( , ρ ) ) if   ρ + 20 > 120   and 5 N d e n s i t y > 1.2 2 # n o d e s # n o d e s R M i r a i # n o d e s otherwise
The simulation result is shown in Table 1, Table 2, Table 3, Table 4 The first two are the cases of the grid topology and respectively show the result when # M i r a i ( 0 ) = 6 or 12, i.e., R M i r a i ( 0 ) = 24.0% or 48.0%. Similarly, the last two are that of the tree topology. Each table consists of three sub tables. The tables (a), (b) and (c) respectively show when = 1, 3, or 5. Each cell shows the mean of R M i r a i ( 1000 ) for 10,000 trials.
Table 1. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 6 , i.e.,  R M i r a i ( 0 ) = 24.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Grid , 13.3 % ) . Yellow highlight: refer from the main text.
Table 1. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 6 , i.e.,  R M i r a i ( 0 ) = 24.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Grid , 13.3 % ) . Yellow highlight: refer from the main text.
SecondaryWithout BDSWith BDS
Infection # White ( 0 ) Launch Strategy
Possibility ρ 13571319 L All Out L Few Elite L Env Adaptive
(a) R M i r a i ( 1000 ) with = 1
0%97.0%97.0%96.9%97.0%96.5%96.9%96.9%96.9%96.9%
25%96.9%96.9%96.7%96.5%95.5%94.7%94.7%94.7%94.7%
50%94.0%88.9%82.9%77.2%66.5%48.1%48.1%48.1%48.1%
75%70.0%61.5%53.9%49.5%41.8%27.7%27.7%27.7%27.7%
100%37.4%26.1%21.9%17.6%13.8%8.6%8.6%8.6%8.6%
(b) R M i r a i ( 1000 ) with = 3
0%97.0%96.9%96.9%97.0%96.5%96.8%96.8%96.8%96.8%
25%84.1%78.1%75.6%74.1%71.4%68.0%68.0%68.0%68.0%
50%32.6%29.7%27.2%25.2%24.0%15.7%15.7%15.7%15.7%
75%7.5%6.6%6.2%5.9%6.7%4.0%4.0%6.2%6.2%
100%1.3%0.6%0.4%0.4%0.1%0.2%0.2%0.4%0.4%
(c) R M i r a i ( 1000 ) with = 5
0%96.8%96.5%96.0%95.8%94.6%93.4%93.4%93.4%93.4%
25%22.0%11.4%10.1%9.7%7.9%8.9%8.9%10.1%10.1%
50%1.5%0.9%1.0%1.0%0.8%0.7%0.7%1.0%1.0%
75%0.2%0.1%0.2%0.2%0.1%0.1%0.1%0.2%0.2%
100%0.0%0.0%0.0%0.0%0.0%0.0%0.0%0.0%0.0%
Table 2. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 12 , i.e.,  R M i r a i ( 0 ) = 48.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Grid , 13.3 % ) . Yellow highlight: refer from the main text.
Table 2. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 12 , i.e.,  R M i r a i ( 0 ) = 48.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Grid , 13.3 % ) . Yellow highlight: refer from the main text.
SecondaryWithout BDSWith BDS
Infection # White ( 0 ) Launch Strategy
Possibility ρ 135713 L All Out L Few Elite L Env Adaptive
(a) R M i r a i ( 1000 ) with = 1
0%96.9%97.0%97.0%97.0%97.0%97.0%97.0%97.0%
25%96.9%96.9%96.9%96.8%96.8%96.8%96.8%96.8%
50%95.0%92.4%90.3%87.0%76.9%76.9%76.9%76.9%
75%72.8%67.1%63.6%59.8%49.4%49.4%49.4%49.4%
100%38.8%29.5%25.8%23.0%16.3%16.3%16.3%16.3%
(b) R M i r a i ( 1000 ) with = 3
0%97.0%97.0%97.0%96.9%96.9%96.9%96.9%96.9%
25%86.4%79.9%79.6%78.4%77.4%77.4%77.4%77.4%
50%35.0%32.1%32.3%31.0%27.0%27.0%27.0%27.0%
75%7.9%8.1%8.4%8.1%7.4%7.4%8.4%8.4%
100%1.1%0.7%0.6%0.7%0.5%0.5%0.6%0.6%
(c) R M i r a i ( 1000 ) with = 5
0%96.9%96.8%96.7%96.5%96.2%96.2%96.2%96.2%
25%26.8%12.2%10.5%10.0%10.0%10.0%10.5%10.5%
50%1.8%0.9%1.1%1.1%1.3%1.3%1.1%1.1%
75%0.0%0.3%0.2%0.2%0.2%0.2%0.2%0.2%
100%0.0%0.0%0.0%0.0%0.0%0.0%0.0%0.0%
Table 3. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 6 , i.e.,  R M i r a i ( 0 ) = 24.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Tree , 8.0 % ) . Yellow highlight: refer from the main text.
Table 3. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 6 , i.e.,  R M i r a i ( 0 ) = 24.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Tree , 8.0 % ) . Yellow highlight: refer from the main text.
SecondaryWithout BDSWith BDS
Infection # White ( 0 ) Launch Strategy
Possibility ρ 13571319 L All Out L Few Elite L Env Adaptive
(a) R M i r a i ( 1000 ) with = 1
0%94.5%94.4%94.6%94.4%94.4%93.9%93.9%93.9%93.9%
25%94.4%94.5%94.4%94.3%94.0%92.4%92.4%92.4%92.4%
50%94.5%94.1%92.9%91.1%81.2%67.9%67.9%67.9%67.9%
75%94.4%92.5%89.0%85.4%70.6%57.2%57.2%57.2%57.2%
100%93.1%87.9%80.2%72.8%52.8%38.1%38.1%38.1%38.1%
(b) R M i r a i ( 1000 ) with = 3
0%94.5%94.5%94.5%94.4%94.3%93.9%93.9%93.9%93.9%
25%94.3%94.0%93.2%92.3%87.8%82.9%82.9%82.9%82.9%
50%92.6%87.4%80.9%74.4%59.4%45.8%45.8%45.8%45.8%
75%81.2%66.0%54.8%48.0%33.6%24.1%24.1%54.8%24.1%
100%58.9%40.3%31.1%24.7%13.7%7.7%7.7%31.1%7.7%
(c) R M i r a i ( 1000 ) with = 5
0%94.2%93.8%93.6%93.4%92.3%91.6%91.6%91.6%91.6%
25%85.7%76.9%69.4%64.6%54.3%47.2%47.2%69.4%47.2%
50%57.7%40.2%31.7%26.9%19.1%14.4%14.4%31.7%14.4%
75%27.4%13.9%10.3%8.1%5.9%3.9%3.9%10.3%3.9%
100%9.5%4.6%2.9%2.5%1.2%0.6%0.6%2.9%0.6%
Table 4. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 12 , i.e.,  R M i r a i ( 0 ) = 48.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Tree , 8.0 % ) . Yellow highlight: refer from the main text.
Table 4. Simulation result of applying BDS to the IoT system infected by Mirai botnet, where # M i r a i ( 0 ) = 12 , i.e.,  R M i r a i ( 0 ) = 48.0 % , ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Tree , 8.0 % ) . Yellow highlight: refer from the main text.
SecondaryWithout BDSWith BDS
Infection # White ( 0 ) Launch Strategy
Possibility ρ 135713 L All Out L Few Elite L Env Adaptive
(a) R M i r a i ( 1000 ) with = 1
0%94.4%94.3%94.5%94.4%94.5%94.5%94.5%94.5%
25%94.4%94.5%94.4%94.5%94.5%94.5%94.5%94.5%
50%94.4%94.4%94.3%93.9%90.0%90.0%90.0%90.0%
75%94.3%93.7%92.6%91.3%83.9%83.9%83.9%83.9%
100%93.6%91.1%87.3%82.8%66.8%66.8%66.8%66.8%
(b) R M i r a i ( 1000 ) with = 3
0%94.4%94.4%94.5%94.4%94.5%94.5%94.5%94.5%
25%94.3%94.2%94.2%93.8%92.0%92.0%92.0%92.0%
50%93.1%90.4%87.5%83.7%72.5%72.5%72.5%72.5%
75%82.5%71.2%64.0%59.4%45.7%45.7%64.0%45.7%
100%61.8%45.7%38.8%33.4%20.2%20.2%38.8%20.2%
(c) R M i r a i ( 1000 ) with = 5
0%94.4%94.3%94.1%94.1%93.8%93.8%93.8%93.8%
25%87.5%79.2%74.2%70.4%62.5%62.5%74.2%62.5%
50%60.6%43.5%36.7%32.7%23.9%23.9%36.7%23.9%
75%28.1%15.8%13.0%10.4%8.0%8.0%13.0%8.0%
100%9.8%5.2%4.3%3.6%1.9%1.9%4.3%1.9%

4.2. Discussion

First, let us discuss the case of the grid topology. Let us see Table 1. This shows the result when # M i r a i ( 0 ) = 6 , i.e., R M i r a i ( 0 ) = 24.0 % , and ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Grid , 13.3 % ) . R M i r a i ( 1000 ) decreased with the increase of # W h i t e ( 0 ) . It also decreased with the increase of secondary infection possibility ρ . Comparing Table 1a–c and seeing the influence of lifespan , we found that R M i r a i ( 1000 ) decreased with the increase of . Next, let us see Table 2. This shows the result when the initial number of Mirai bots is twice as much as Table 1. Each value became slightly bigger because the initial number of Mirai bots increased but the trend was the same.
Let us discuss the effect of the proposed strategies. R M i r a i ( 1000 ) almost monotonously decreased with the increase of # W h i t e ( 0 ) . This result backs up L A l l O u t ’s validity. However, white-hat bots are a so-called double-edged sword. They defend the IoT system against Mirai bots, but they waste the system’s resources if they stay there even after exterminating all the Mirai bots. L F e w E l i t e and L E n v A d a p t i v e can reduce # W h i t e ( 0 ) than L A l l O u t . In Table 1, the yellow highlighted cells show the results when only 5 worms were launched instead of 19 ones. When the worm’s lifespan is short (See Table 1a), i.e., = 1 , all the strategies launched 19 worms because the worm’s capability was decided to be insufficient according to Equation (7). When = 3 and ρ 75 % (See Table 1b), L F e w E l i t e and L E n v A d a p t i v e launched only five worms. Those strategies reduced # W h i t e ( 0 ) from 19 to 5 only after increasing R M i r a i by at most 2.2%. When = 5 and ρ 25 % (See Table 1c), L F e w E l i t e and L E n v A d a p t i v e reduced # W h i t e ( 0 ) from 19 to 5 almost without changing R M i r a i . Moreover, as shown in Table 2, even though the initial number of Mirai bots is twice, if a given worm has enough capability, L F e w E l i t e and L E n v A d a p t i v e reduced # W h i t e to five only with increasing R M i r a i by at most 1.0%. From the above, we can say that L F e w E l i t e and L E n v A d a p t i v e are effective for the IoT systems with the grid topology.
Next, let us discuss the case of the tree topology. Let us see Table 3. This shows the result when # M i r a i ( 0 ) = 6 , i.e., R M i r a i ( 0 ) = 24.0 % , and ( # n o d e s , N t o p o l o g y , N d e n s i t y ) = ( 25 , Tree , 8.0 % ) . R M i r a i ( 1000 ) decreased with the increase of # W h i t e ( 0 ) , ρ or . However, in comparison to the result of Table 1, the reduction rate of R M i r a i ( 1000 ) significantly reduced. This means that the network with low density restrains the white-hat bots’ activities. Next, let us see Table 4. This shows the result when the initial number of Mirai bots is twice as much as Table 3. In the same way as the case of the grid topology, each value became slightly bigger, but the trend was the same.
Next, let us discuss the effect of the proposed strategies. In Table 3 and Table 4, the yellow highlighted cells show the results when only 5 worms were launched. As with the case of the grid topology, L F e w E l i t e reduced # W h i t e ( 0 ) to five based on the worm’s capability only. Meanwhile, L E n v A d a p t i v e did not reduce # W h i t e ( 0 ) under that condition because the network density is low, i.e., N d e n s i t y = 8.0 % 1.2 2 # n o d e s = 1.2 2 25 = 9.6 % . We should discuss the advantage and disadvantage. For instance, let us see the result when e l l = 3 and ρ = 75 % in Table 3b. L F e w E l i t e reduced # W h i t e ( 0 ) to five. However, R M i r a i ( 1000 ) increased by 30.7%. So did the other highlighted cells. We think that five worms was too few to produce enough effect under the restriction caused by the network with low density. From the above discussion, we can say that L E n v A d a p t i v e is reasonable for the IoT systems with the tree topology.

5. Conclusions

In this paper, we proposed the concept, design and basic strategies of Botnet Defense System (BDS). Imitating “Fight fire with fire”, we advocated the concept of BDS, “Fight botnet with botnet”. When a BDS detects a malicious botnet, it plans a strategy against the botnet. Based on the planned strategy, the BDS sends a white-hat worm and builds its botnet on the IoT system. The BDS uses the white-hat botnet to exterminate the malicious botnet. We adopted component-based architecture and composed BDS from four components. Next, we studied a strategy to launch white-hat worms. We formalized a launch strategy and proposed three kinds of concrete strategies. The All-Out strategy is a baseline in strategy studies and sends white-hat worms to all the non-bot nodes. The Few-Elite strategy can reduce white-hat worms according to its capability. The Environment-Adaptive strategy can adjust the number of white-hat worms based on not only the worm’s capability but also the IoT system’s specification. We modeled the battle between Mirai botnets and the white-hat botnets with agent-oriented Petri net PN 2 and evaluated BDS and the proposed strategies through the simulation of the PN 2 model. The simulation result shows that the Environment-Adaptive strategy is the best and reduced the number of needed white-hat worms to 38.5% almost without changing the extermination rate for Mirai bots.
In future work, we will propose C&C strategies and combine them with the proposed launch strategies.

Funding

This research was funded by JSPS KAKENHI Grant Number JP19K11965.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, J.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium (SEC’17), Vancouver, BC, Canada, 16–18 August 2017; pp. 1093–1110. [Google Scholar]
  2. Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. IEEE Comput. 2017, 50, 80–84. [Google Scholar] [CrossRef]
  3. Remillano, A., II; Urbanec, J. New Mirai Variant Uses Multiple Exploits to Target Routers and Other Devices. Available online: https://blog.trendmicro.com/trendlabs-security-intelligence/new-mirai-variant-uses-multiple-exploits-to-target-routers-and-other-devices/ (accessed on 10 April 2020).
  4. US Computer Emergency Readiness Team. Heightened DDoS Threat Posed by Mirai and Other Botnets. alert TA16-288A. Available online: Https://www.us-cert.gov/ncas/alerts/TA16-288A (accessed on 29 October 2019).
  5. Moffitt, T. Source Code for Mirai IoT Malware Released. Available online: https://www.webroot.com/blog/2016/10/10/source-code-Mirai-iot-malware-released/ (accessed on 10 April 2020).
  6. Cisco Annual Internet Report (2018–2023) White Paper. Available online: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html (accessed on 19 July 2020).
  7. Yamaguchi, S. White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets. Sensors 2020, 20, 556. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Hiraishi, K. A Petri-net-based model for the mathematical analysis of multi-agent systems. IEICE Trans. Fundam. 2001, 84, 2829–2837. [Google Scholar]
  9. Yamaguchi, S.; Bin Ahmadon, M.A.; Ge, Q.W. Introduction of Petri Nets: Its Applications and Security Challenges. In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; Gupta, B.B., Agrawal, D.P., Yamaguchi, S., Eds.; IGI Publishing: Hershey, PA, USA, 2016; pp. 145–179. [Google Scholar]
  10. Ogu, E.C.; Ojesanmi, O.A.; Awodele, O.; Kuyoro, S. A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far. Information 2019, 10, 337. [Google Scholar] [CrossRef] [Green Version]
  11. Bezerra, V.H.; da Costa, V.G.T.; Barbon, J.; Miani, R.S.; Zarpelão, B.B. IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices. Sensors 2019, 19, 3188. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Manso, P.; Moura, J.; Serrão, C. SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks. Information 2019, 10, 106. [Google Scholar] [CrossRef] [Green Version]
  13. Edwards, S.; Profetis, I. Hajime: Analysis of a Decentralized Internet Worm for IoT Devices. Available online: Http://security.rapiditynetworks.com/publications/2016-10-16/Hajime.pdf (accessed on 29 October 2019).
  14. Molesky, M.J.; Cameron, E.A. Internet of Things: An Analysis and Proposal of White Worm Technology. In Proceedings of the 37th IEEE International Conference on Consumer Electronics (ICCE 2019), Las Vegas, NV, USA, 11–13 January 2019. [Google Scholar]
  15. Nakahori, K.; Yamaguchi, S. A support tool to design IoT services with NuSMV. In Proceedings of the 35th IEEE International Conference on Consumer Electronics (ICCE 2017), Las Vegas, NV, USA, 8–10 January 2017; pp. 84–87. [Google Scholar]
Figure 1. A PN 2 model representing a battle between Mirai and the white-hat worm.
Figure 1. A PN 2 model representing a battle between Mirai and the white-hat worm.
Information 11 00516 g001
Figure 2. The state after the white-hat worm infected device2. This disables Mirai from infecting device2.
Figure 2. The state after the white-hat worm infected device2. This disables Mirai from infecting device2.
Information 11 00516 g002
Figure 3. System configuration of BDS.
Figure 3. System configuration of BDS.
Information 11 00516 g003
Figure 4. An application example of the All-Out launch strategy L A l l O u t . (a) State when the BDS detected a Mirai botnet, (b) State after launching.
Figure 4. An application example of the All-Out launch strategy L A l l O u t . (a) State when the BDS detected a Mirai botnet, (b) State after launching.
Information 11 00516 g004
Figure 5. An application example of the Few-Elite launch strategy L F e w E l i t e , (a) State after launching a limited number when the worm’s capability is sufficient, (b) State after launching the upper number when the worm’s capability is insufficient.
Figure 5. An application example of the Few-Elite launch strategy L F e w E l i t e , (a) State after launching a limited number when the worm’s capability is sufficient, (b) State after launching the upper number when the worm’s capability is insufficient.
Information 11 00516 g005
Figure 6. An application example of the Environment-Adaptive launch strategy L E n v A d a p t i v e .
Figure 6. An application example of the Environment-Adaptive launch strategy L E n v A d a p t i v e .
Information 11 00516 g006
Figure 7. Illustration of translating a network into a PN 2 model.
Figure 7. Illustration of translating a network into a PN 2 model.
Information 11 00516 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yamaguchi, S. Botnet Defense System: Concept, Design, and Basic Strategy. Information 2020, 11, 516. https://0-doi-org.brum.beds.ac.uk/10.3390/info11110516

AMA Style

Yamaguchi S. Botnet Defense System: Concept, Design, and Basic Strategy. Information. 2020; 11(11):516. https://0-doi-org.brum.beds.ac.uk/10.3390/info11110516

Chicago/Turabian Style

Yamaguchi, Shingo. 2020. "Botnet Defense System: Concept, Design, and Basic Strategy" Information 11, no. 11: 516. https://0-doi-org.brum.beds.ac.uk/10.3390/info11110516

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop