Preview

Detection of Botnets Using Honeypots and P2P Botnets

Powerful Essays
Open Document
Open Document
3125 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Detection of Botnets Using Honeypots and P2P Botnets
Rajab Challoo & Raghavendra Kotapalli

Detection of Botnets Using Honeypots and P2P Botnets
Rajab Challoo
Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA

kfrc000@tamuk.edu

Raghavendra Kotapalli
Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA

raghavsan@gmail.com

Abstract A “botnet” is a group of compromised computers connected to a network, which can be used for both recognition and illicit financial gain, and it is controlled by an attacker (bot-herder). One of the counter measures proposed in recent developments is the “Honeypot”. The attacker who would be aware of the Honeypot, would take adequate steps to maintain the botnet and hence attack the Honeypot (Infected Honeypot). In this paper we propose a method to remove the infected Honeypot by constructing a peer-to-peer structured botnet which would detect the uninfected Honeypot and use it to detect botnets originally used by the attacker. Our simulation results show that our method is very effective and can detect the botnets that are intended to malign the network. Keywords: Peer-to-peer network, Botnet, Honeypot, Hijacking.

1. INTRODUCTION
The Increase in the Internet malware in the recent attacks have attracted considerable amount of attraction towards botnets. Some of them include Email spamming, Key logging, click fraud and traffic sniffing [1]. Recently detected dangerous botnets include Mariposa (2008), officla (2009) and TDSS (2010). The scatter attacks done by the bot controllers using a program called bot which communicates with other botnets and receive the commands from Command and Control servers [3]. As the traditional botnets, which are designed to operate from a central source (bot-attackers machine) which can be shutdown if the source is pin-pointed by the security agencies, bot masters use or resort to peer to peer (P2P) botnets which do not have a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Tends to increase in countries experiencing rapid growth in broadband infrastructure and connectivity, , readily available malicious code kits are making it simple for attackers to mount attacks, the online underground economy and malicious activity are benefiting from the downturn in the global economy.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Marketing Plan

    • 1799 Words
    • 8 Pages

    Description: TODO’s is an errand running service for working parents, handicapped, or the elderly. We can perform any errand, most of the time, for a reasonable price. Our first priority is customer satisfaction.…

    • 1799 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Ce 231 Final Exam

    • 2167 Words
    • 9 Pages

    2b) Derive an expression for the common emitter current gain $ ($ = IC/IB), in terms…

    • 2167 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Synopsis and Summary In this article from The New York Times, Gretchen Reynolds talks about the relationship between exercise and dancing, relating to the white matter in our brains. The University of Illinois gathered 147 volunteers, both men and women and gave them tests for their cognitive abilities and reaction time, along with taking an in-depth MRI. Over a six-month span, the people were broken up into three different groups, each group doing different activities, but doing them for an hour, three times a week.…

    • 765 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    This paper was prepared and submitted for CJ360 Cybercrime Fall 2014, taught by Professor Alecia Schmidt.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Schrodel, David (2003, December 01). Network Configuration Management. Computer Technology Review, (12), 18, Retrieved from http://elibrary.bigchalk.com…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Peer to peer (P2P) computing, which is a specific implementation of distributed computing, has been described as a most promising technology since it can be applied to many fields and it has made great contributions. P2P file sharing, or P2P file exchanging, is one typical application of P2P and one caused great debates as well. In this paper, I will introduce the general theory of P2P file sharing, the features and drawbacks of P2P file sharing and the current situation of piracy via P2P networks. In the end, I will present possible solutions to help solve the piracy problem caused by P2P file sharing.…

    • 2238 Words
    • 9 Pages
    Powerful Essays