Researchers simulate a botnet of 1 million zombies

Share this article:
Computer scientists working for the U.S. Department of Energy announced this week that they have been able to create a simulated botnet consisting of more than one million machines.

Researchers at Sandia National Laboratories in California, headed by Ron Minnich and Don Rudish, were able to boot more than one million kernels, or the central component of most operating systems, as virtual machines in a massive botnet simulation. Previously, researches had only been able to create a simulated botnet of up to 20,000 nodes.

Right now the foundation of the botnet has been created, but researchers have not actually run it yet, Minnich told SCMagazineUS.com on Friday. With the next phase of the project, which will begin Oct. 1 and then run for three years, researchers will actually fire up the botnet they have created.  

“At a minimum it would be nice to find out how to slow them down or stop them,” Minnich said.

Minnich added, perhaps ruefully, “The people who write botnets are just brilliant people in my view and they put a lot of work into making these things very hard to detect.”

The task of analyzing botnets is difficult since infected computers are distributed all over the world, researchers said.

“The more kernels that can be run at once, the more effective cybersecurity professionals can be in combating the global botnet problem,” Minnich said in a statement.

Researchers used Linux kernels for the simulation. To achieve the virtual botnet, scientists used virtual machine (VM) technology, emulating real machines in software, and a powerful supercomputing cluster at Sandia called Thunderbird. Essentially, they were able to spin up a million VMs on one supercomputer.

And now that researchers have established a simulated botnet of one million, they are setting their sights on loftier goals.

“Eventually, we would like to be able to emulate the computer network of a small nation, or even one as large as the United States, in order to ‘virtualize' and monitor a cyberattack,” Minnich said.

If their next goal is met, researchers should be able to construct models of parts of the internet to better understand and analyze overall processes.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.