Academic Journals Database
Disseminating quality controlled scientific knowledge

Detection of Botnets using Honeypots and P2P Botnets

ADD TO MY LIST
 
Author(s): Rajab Challoo & Raghavendra Kotapalli

Journal: International Journal of Computer Science and Security
ISSN 1985-1553

Volume: 5;
Issue: 5;
Start page: 496;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Peer-to-peer network | Botnet | Honeypot | Hijacking.

ABSTRACT
A “botnet” is a group of compromised computers connected to a network, which can be used forboth recognition and illicit financial gain, and it is controlled by an attacker (bot-herder). One ofthe counter measures proposed in recent developments is the “Honeypot”. The attacker whowould be aware of the Honeypot, would take adequate steps to maintain the botnet and henceattack the Honeypot (Infected Honeypot). In this paper we propose a method to remove theinfected Honeypot by constructing a peer-to-peer structured botnet which would detect theuninfected Honeypot and use it to detect botnets originally used by the attacker. Our simulationresults show that our method is very effective and can detect the botnets that are intended tomalign the network.

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions