基于僵尸网络的新型网格计算分布式暴力攻击方案(GCDBF)(IJCNIS-V9-N6-3)

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

I.J.ComputerNetworkandInformationSecurity,2017,6,21-29PublishedOnlineJune2017inMECS()DOI:10.5815/ijcnis.2017.06.03Copyright©2017MECSI.J.ComputerNetworkandInformationSecurity,2017,6,21-29OnaNovelGridComputing-BasedDistributedBrute-forceAttackScheme(GCDBF)ByExploitingBotnetsMohammadReza.HasaniAhangarImamHosseinUniversity/DepartmentofComputerEngineering,Tehran,IranE-mail:mrhasani@ihu.ac.irMohammadReza.EsmaeiliTabaandArash.GhafouriAmirkabirUniversityofTechnology(TehranPolytechnic)/DepartmentofComputerEngineering,Tehran,Iran,ImamHosseinUniversity/DepartmentofComputerEngineeringE-mail:mreza.taba@aut.ac.ir,krghafouri@ihu.ac.irAbstract—Brute-forceattacksareknowntobethepromisingwaytobreakintoevenmostcomplicatedsystemsbytryingeverypossiblepermutationofthekeys.Butsincecryptosystemsbegantouselongerandmorecomplexkeys,brute-forceattackshaslosttheirusability,becauseofrelativelyhighcomplexityoftryingeverypossiblepermutationwithrespecttocomputationalpowerandcomputationtimethatwasavailabletocryptobreakers.Althoughcomputationalpowerisincreasingcontinuously,itsincreasingrateislessthanthatofkeylengthandcomplexity.Havingtheseassumptionsinmind,itisinfeasibleforcentralizedtraditionalcomputingarchitectureswithlimitedcomputationpowertobreakintomoderncryptosystembycompromisingthekeywithimplementingschemeslikeconventionalbrute-force.Inthispaperauthorsaimfordevisinganovelbrute-forceschemewhichintegratesamoderncomputingarchitecture(gridcomputing)withbotnetsinordertoperformbrute-forceattackswithlowercomputationtimeandlowerequipmentcostforindividualcryptobreakerswhohavenoaccesstosupercomputers.Insummary,GCDBFusesaportionofcomputationpowerofeachoftheinfectednodesbelongingtoabotnetinagrid-basedenvironmentinordertoprocessaportionoftotalworkloadofabrute-forceattackwhichisneededforbreakingaspecifickey.Thisapproachneutralizestheneedofacquiringsupercomputersforindividualhackerswhilereducingtherequiredtimeforbreakingthekeybecauseofusinggridcomputingarchitecture.Forthepurposeofevaluation,GCDBFisimplementedindifferentscenariostoproveitsperformanceincomparisontocentralizedbrute-forcescheme.IndexTerms—Brute-force,gridcomputing,distributedcomputing,botnets.I.INTRODUCTIONBrute-forceattackshavebeenrecognizedasonethemostbasicandpromisingwaysforbreakingciphersforalongperiodoftime.Inordertoneutralizethiskindofattack,cryptosystemsdesignersbegantofurthercomplicatetheirsystemswhichresultsinmorecomplexityforbreakingthem.Ontheotherhand,computingpowerhasalsoincreased.Thesetwoapproachescreateaclosecompetitionbetweencryptosystemsdesignersandcryptobreakers.Sincethen,cryptosystemsdesignersfoundawaytoovercomethisissuewhichwas:increasingthekeyspace.Forakeywithlengthofnbinarybits,wehavetheprobabilityspace(orkeyspace)of.Inaverageaneffortoforderisrequiredtofindtheactualkey.Therefore,akeywithlong-enoughlength(i.e.,128bits)requiresaverylongtimetobreakanditisalsocomputationallyexpensivetoperform.Thisamountofcomputationaleffortandtimemakescentralizedbrute-forceattacksinfeasibleintermsofcomputationtimeandequipmentcost.Therefore,nowadaysbrute-forceattacksarenotaseffectiveastheywereatthebeginning.Inthispaper,wedeviseanovelscheme(GCDBF)whichitselfbasicallyconsistsofacombinationofthreemainconcepts:1.Brute-forceattacks2.Botnets3.GridComputingEachofwhichwillbebrieflydescribedrespectively.A.Brute-forceAttackBrute-forceattacksaredesignedtofindkeys(suchaspasswords)withguessingortryingeverypossiblekey.Forexample,cryptobreakersassumethatuserschoosetheirpasswordsfromasmallsubsetofthefullpasswordspace,e.g.,shortpasswords,dictionarywords,propernames,andlowercasestrings[1,2].Inthiscase,theattackersattempttologintouseraccountsbytryingalmostallofthepossiblepasswordsuntiltheactualoneisfound.Ifthecryptobreakersexploitapredeterminedlistofcommonorusualpasswords,theywillbeabletoperformadictionaryattack,otherwisetheyspaceof22OnaNovelGridComputing-BasedDistributedBrute-forceAttackScheme(GCDBF)ByExploitingBotnetsCopyright©2017MECSI.J.ComputerNetworkandInformationSecurity,2017,6,21-29passwordswillbesearchedbyusingbrute-forceattack.Brute-forceattacksdivideintosimpleordistributedattacks.Insimpleattacksorcentralizedattacks,thecryptobreakerusesonlyonehostthatsearchesfortheactualpassword.Indistributedattacks,manycryptobreakerssendrelativelysmallnumbersofrequestsatonce[2].ItisnoteworthythatGCDBFdistributionisdifferentthan[2]orothersimilarworks,sinceitconductsbrute-forcebyimplementingitbythemeansofgridcomputingconceptsandbotnets’components.Brute-forceattacksrequiresignificantamountoftimeandprocessingpowerwhenthekeyspaceislong.Acomputerprogramisusuallyusedtoconductabrute-forceattack.Theeffortofbrute-forceshouldstartwithonedigitpasswordnumberandcoverallpossibilitiesinaworstcase[3,4].B.BotnetsAbotnetisanetworkofthousandsofcomputers(knownasbots,zombiesorinfectednodes)thatareinfectedbyaparticularmalwareandarecontrolledbyabotmaster(orbotherder)[5].Botherder(personwhocreatesthebotandisabletocontrolitremotely)sendcommandstoaserver,whichrelaysthosecommandstoinfectednodes.Uponexecutingthecomm

1 / 9
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功