Global Internet threats are undergoing a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. This alarming new class of attacks directly impacts the day to day lives of millions of people and endangers businesses and governments around the world. At the centre of many of these attacks is a large pool of compromised computers located in homes, schools, businesses, and governments around the world. Attackers use these zombies as anonymous proxies to hide their real identities and amplify their attacks. Bot software enables an operator to remotely control each system and group them together to form what is commonly referred to as a zombie army or botnet. A botnet is a network of compromised machines that can be remotely controlled by an attacker. In this we propose an approach using honeynet data collection mechanisms to detect IRC and HTTP based botnet. We have evaluated our approach using real world network traces. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Bhatia, J. S., Sehgal, R. K., & Kumar, S. (2011). Honeynet based botnet detection using command signatures. In Communications in Computer and Information Science (Vol. 154 CCIS, pp. 69–78). https://doi.org/10.1007/978-3-642-21153-9_7
Mendeley helps you to discover research relevant for your work.