Honeynet based botnet detection using command signatures

6Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Global Internet threats are undergoing a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. This alarming new class of attacks directly impacts the day to day lives of millions of people and endangers businesses and governments around the world. At the centre of many of these attacks is a large pool of compromised computers located in homes, schools, businesses, and governments around the world. Attackers use these zombies as anonymous proxies to hide their real identities and amplify their attacks. Bot software enables an operator to remotely control each system and group them together to form what is commonly referred to as a zombie army or botnet. A botnet is a network of compromised machines that can be remotely controlled by an attacker. In this we propose an approach using honeynet data collection mechanisms to detect IRC and HTTP based botnet. We have evaluated our approach using real world network traces. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bhatia, J. S., Sehgal, R. K., & Kumar, S. (2011). Honeynet based botnet detection using command signatures. In Communications in Computer and Information Science (Vol. 154 CCIS, pp. 69–78). https://doi.org/10.1007/978-3-642-21153-9_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free