Home   >   CSC-OpenAccess Library   >    Manuscript Information
Detection of Botnets using Honeypots and P2P Botnets
Rajab Challoo, Raghavendra Kotapalli
Pages - 496 - 502     |    Revised - 01-11-2011     |    Published - 15-12-2011
Volume - 5   Issue - 5    |    Publication Date - November / December 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Peer-to-peer network, Botnet, Honeypot, Hijacking
ABSTRACT
A “botnet” is a group of compromised computers connected to a network, which can be used for both recognition and illicit financial gain; controlled by an attacker (bot-herder). Among the counter measures proposed in the recent developments is the “Honeypot”. The attacker who would be aware of the Honeypot would take adequate steps to maintain the botnet, hence attack the Honeypot (Infected Honeypot). In this paper we propose a method to remove the infected Honeypot by Constructing a Peer-to-peer structured botnet which would detect the uninfected Honeypot and use it to detect botnets originally used by the attacker. Our simulation shows that this method is very effective and can detect the botnets that are intended to malign the network.
CITED BY (6)  
1 Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques.
2 Jain, N., Sharma, A., & Sharma, A. Nav view search.
3 Blandón, M. G., Howard, G. M., & Torres, R. (2013). Estudio de Medición de la Actividad de Botnets en la República de Panamá.
4 LA, A. D. B. E.mario isaac gongora bland on.
5 Brown, S., Lam, R., Prasad, S., Ramasubramanian, S., & Slauson, J. (2012). Honeypots in the cloud. University of Wisconsin-Madison.
6 Zhang Quan . ( 2012 ) . In the network behavior to PSO + K-means of detection mechanism botnets . The dissertation cause Datong University Department of Business Administration , 1-69.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 Bielefeld Academic Search Engine (BASE) 
6 Scribd 
7 SlideShare 
8 PdfSR 
A Taste of HTTP Botnets , team-cymru Inc, 2008, Available : http://www.teamcymru. org/ReadingRoom/Whitepapers/2008/http-botnets.pdf.
A. Karasaridis, B. Rexroad, D. Hoeflin, “Widescale botnet detection and characterization,” Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
A. Ramachandran, N. Feamster, and D. Dagon, “Revealing Botnet Membership Using DNSBL Counter-Intelligence,” Proc. USENIX Second Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI ’06), June 2006.
C. Davis, S. Neville, J. Fernandez, J.-M. Robert, and J. McHugh, "Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures," In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS’08), October 2008.
Chia-Mei Chen, Ya-Hui Ou, and Yu-Chou Tsai, “Web Botnet Detection Based on Flow Information,” Department of Information Management, National Sun Yat –Sen University, Kaohsiung, Taiwan; IEEE 2010.
Chiang K, Lloyd L. A case study of the rustock rootkit and spam bot. In: Proc. of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007). 2007.
Cliff C. Zou, Ryan Cunningham, “Honeypot-Aware Advanced Botnet Construction and Maintenance,” IEEE Computer society; Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN’06).
D. Dagon, C. Zou, and W. Lee, “Modeling Botnet Propagation Using Time Zones,” Proc. 13th Ann. Network and Distributed System Security Symp. (NDSS ’06), pp. 235-249, Feb. 2006.
F. Monrose, “Longitudinal Analysis of Botnet Dynamics,”ARO/DARPA/DHS Special Workshop Botnet, 2006.
J.R. Binkley and S. Singh, “An Algorithm for Anomaly-Based Botnet Detection,” Proc. USENIX Second Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI ’06), June 2006.
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A Multifaceted Approach to Understanding the Botnet Phenomenon,” Proc. ACM SIGCOMM Internet Measurement Conf. (IMC ’06), Oct. 2006.
P. Wang, S. Sparks, and Cliff C. Zou, “An Advanced Hybrid Peer-to-Peer Botnet,” IEEE; Vol. 7, No. 2, April-June 2010.
Phatbot Trojan Analysis, http://www.lurhq.com/phatbot.html, 2008.
R. Hund, M. Hamann, and T. Holz, "Towards Next-Generation Botnets," in Computer network Defense, 2008. EC22D 2008. European Conference on, 2008, pp. 13-40.
Sinit P2P Trojan Analysis, http://www.lurhq.com/sinit.html, 2008.
Vogt R, Aycock J, Jacobson MJ. Army of botnets. In: Proc. of the 14th Annual Network & Distributed System Security Conf(NDSS). 2007.
Washington Post: The Botnet Trackers, http://www.washingtonpos.com/wp-d y n / content/article/2006/02/16AR2006021601388.html, Feb. 2006.
XF. Li, HX. Duan,W.Liu JP.Wu, "Understanding the Construction Mechanism of Botnets," uic-atc, pp.508-512, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2009.
Zesheng Chen, Chao Chen, Qian Wang, "Delay-Tolerant Botnets," icccn, pp.1-6, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009.
Dr. Rajab Challoo
Texas A&M University-Kingsville - United States of America
kfrc000@tamuk.edu
Mr. Raghavendra Kotapalli
- United States of America


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS