Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.


Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Saudi Arabia
Detection of Botnets using Honeypots and P2P Botnets
Rajab Challoo, Raghavendra Kotapalli
Pages - 496 - 502     |    Revised - 01-11-2011     |    Published - 15-12-2011
Volume - 5   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
Peer-to-peer network, Botnet, Honeypot, Hijacking
A “botnet” is a group of compromised computers connected to a network, which can be used for both recognition and illicit financial gain; controlled by an attacker (bot-herder). Among the counter measures proposed in the recent developments is the “Honeypot”. The attacker who would be aware of the Honeypot would take adequate steps to maintain the botnet, hence attack the Honeypot (Infected Honeypot). In this paper we propose a method to remove the infected Honeypot by Constructing a Peer-to-peer structured botnet which would detect the uninfected Honeypot and use it to detect botnets originally used by the attacker. Our simulation shows that this method is very effective and can detect the botnets that are intended to malign the network.
CITED BY (6)  
1 Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques.
2 Jain, N., Sharma, A., & Sharma, A. Nav view search.
3 Blandón, M. G., Howard, G. M., & Torres, R. (2013). Estudio de Medición de la Actividad de Botnets en la República de Panamá.
4 LA, A. D. B. E.mario isaac gongora bland on.
5 Brown, S., Lam, R., Prasad, S., Ramasubramanian, S., & Slauson, J. (2012). Honeypots in the cloud. University of Wisconsin-Madison.
6 Zhang Quan . ( 2012 ) . In the network behavior to PSO + K-means of detection mechanism botnets . The dissertation cause Datong University Department of Business Administration , 1-69.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 Bielefeld Academic Search Engine (BASE) 
6 Scribd 
7 SlideShare 
8 PdfSR 
1 P. Wang, S. Sparks, and Cliff C. Zou, “An Advanced Hybrid Peer-to-Peer Botnet,” IEEE; Vol. 7, No. 2, April-June 2010.
2 Cliff C. Zou, Ryan Cunningham, “Honeypot-Aware Advanced Botnet Construction and Maintenance,” IEEE Computer society; Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN’06).
3 Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, “Web Botnet Detection Based on Flow Information,” Department of Information Management, National Sun Yat –Sen University, Kaohsiung, Taiwan; IEEE 2010.
4 D. Dagon, C. Zou, and W. Lee, “Modeling Botnet Propagation Using Time Zones,” Proc. 13th Ann. Network and Distributed System Security Symp. (NDSS ’06), pp. 235-249, Feb. 2006.
5 A. Ramachandran, N. Feamster, and D. Dagon, “Revealing Botnet Membership Using DNSBL Counter-Intelligence,” Proc. USENIX Second Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI ’06), June 2006.
6 J.R. Binkley and S. Singh, “An Algorithm for Anomaly-Based Botnet Detection,” Proc. USENIX Second Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI ’06), June 2006.
7 Sinit P2P Trojan Analysis, http://www.lurhq.com/sinit.html, 2008.
8 Phatbot Trojan Analysis, http://www.lurhq.com/phatbot.html, 2008.
9 F. Monrose, “Longitudinal Analysis of Botnet Dynamics,”ARO/DARPA/DHS Special Workshop Botnet, 2006.
10 Washington Post: The Botnet Trackers, http://www.washingtonpos.com/wp-d y n / content/article/2006/02/16AR2006021601388.html, Feb. 2006.
11 M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A Multifaceted Approach to Understanding the Botnet Phenomenon,” Proc. ACM SIGCOMM Internet Measurement Conf. (IMC ’06), Oct. 2006.
12 A. Karasaridis, B. Rexroad, D. Hoeflin, “Widescale botnet detection and characterization,” Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
13 A Taste of HTTP Botnets , team-cymru Inc, 2008, Available : http://www.teamcymru. org/ReadingRoom/Whitepapers/2008/http-botnets.pdf.
14 Vogt R, Aycock J, Jacobson MJ. Army of botnets. In: Proc. of the 14th Annual Network & Distributed System Security Conf(NDSS). 2007.
15 Zesheng Chen, Chao Chen, Qian Wang, "Delay-Tolerant Botnets," icccn, pp.1-6, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009.
16 XF. Li, HX. Duan,W.Liu JP.Wu, "Understanding the Construction Mechanism of Botnets," uic-atc, pp.508-512, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2009.
17 Chiang K, Lloyd L. A case study of the rustock rootkit and spam bot. In: Proc. of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007). 2007.
18 R. Hund, M. Hamann, and T. Holz, "Towards Next-Generation Botnets," in Computer network Defense, 2008. EC22D 2008. European Conference on, 2008, pp. 13-40.
19 C. Davis, S. Neville, J. Fernandez, J.-M. Robert, and J. McHugh, "Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures," In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS’08), October 2008.
Dr. Rajab Challoo
Texas A&M University-Kingsville - United States of America
Mr. Raghavendra Kotapalli
- United States of America