Researchers simulate a botnet of 1 million zombies

Share this article:
Computer scientists working for the U.S. Department of Energy announced this week that they have been able to create a simulated botnet consisting of more than one million machines.

Researchers at Sandia National Laboratories in California, headed by Ron Minnich and Don Rudish, were able to boot more than one million kernels, or the central component of most operating systems, as virtual machines in a massive botnet simulation. Previously, researches had only been able to create a simulated botnet of up to 20,000 nodes.

Right now the foundation of the botnet has been created, but researchers have not actually run it yet, Minnich told on Friday. With the next phase of the project, which will begin Oct. 1 and then run for three years, researchers will actually fire up the botnet they have created.  

“At a minimum it would be nice to find out how to slow them down or stop them,” Minnich said.

Minnich added, perhaps ruefully, “The people who write botnets are just brilliant people in my view and they put a lot of work into making these things very hard to detect.”

The task of analyzing botnets is difficult since infected computers are distributed all over the world, researchers said.

“The more kernels that can be run at once, the more effective cybersecurity professionals can be in combating the global botnet problem,” Minnich said in a statement.

Researchers used Linux kernels for the simulation. To achieve the virtual botnet, scientists used virtual machine (VM) technology, emulating real machines in software, and a powerful supercomputing cluster at Sandia called Thunderbird. Essentially, they were able to spin up a million VMs on one supercomputer.

And now that researchers have established a simulated botnet of one million, they are setting their sights on loftier goals.

“Eventually, we would like to be able to emulate the computer network of a small nation, or even one as large as the United States, in order to ‘virtualize' and monitor a cyberattack,” Minnich said.

If their next goal is met, researchers should be able to construct models of parts of the internet to better understand and analyze overall processes.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Reported breaches involving zero-day bug at JPMorgan Chase, other banks

Reported breaches involving zero-day bug at JPMorgan Chase, ...

Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.

Data on 97K Bugzilla users posted online for about three months

During a migration of the testing server for test builds of Bugzilla software, data on about 97,000 Bugzilla users was inadvertently posted publicly online.

Chinese national had access to data on 5M Arizona drivers, possible breach ...

Although Lizhong Fan left the U.S. in 2007, the agencies responsible for giving him access to Americans' personal information have yet to disclose the details of the case to the public.