Main Reference PaperAn Advanced Hybrid Peer-to-Peer Botnet, IEEE Transactions on Dependable and Secure Computing, June 2010.
  • This project presents the design of an advanced hybrid peer-to-peer botnet. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. In the end, we suggest and analyze several possible defenses against this advanced botnet.

+ Description
  • This project presents the design of an advanced hybrid peer-to-peer botnet. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. In the end, we suggest and analyze several possible defenses against this advanced botnet.

  • To provide easy monitoring.

  • To provide robust network connectivity.

+ Aim & Objectives
  • To provide easy monitoring.

  • To provide robust network connectivity.

  • In this project we present the design of an advanced hybrid P2P botnet. Compared with current botnets, the proposed one is harder to be monitored, and much harder to be shut down. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each captured bot, and easy monitoring and recovery by its botmaster. To defend against such anadvanced botnet, we point out that honeypots may play an important role.

+ Contribution
  • In this project we present the design of an advanced hybrid P2P botnet. Compared with current botnets, the proposed one is harder to be monitored, and much harder to be shut down. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each captured bot, and easy monitoring and recovery by its botmaster. To defend against such anadvanced botnet, we point out that honeypots may play an important role.

  • Java JDK 1.8, MySQL 5.5.40

  • J2SE, Java Swing

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • J2SE, Java Swing

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.