2012
DOI: 10.1002/sec.431
|View full text |Cite
|
Sign up to set email alerts
|

Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

Abstract: As botnets have become the primary means for cyber attacks, how to detect botnets becomes an important issue for researchers and practitioners. In this study, we introduce a system that is designed to detect botnets prior to their activation. Pre‐detection of botnets becomes available with our enhanced honeypot system that allows us to intentionally infect virtual machines in honeynets. For empirical testing, we applied our system to a major Internet service provider in Korea. After running our proposed system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Examples of implementations of the honeypot technique towards countering botnets can be found in sources such as Al-Hakbani and Dahshan (2015) [91], Daniel and Hongmei (2013) [92] and Moon et al [93]. As adapted based on insights received from Barfar et al [94], Figure 5 illustrates a basic (naïve) deployment of honeypots.…”
Section: Analysis-basedmentioning
confidence: 99%
“…Examples of implementations of the honeypot technique towards countering botnets can be found in sources such as Al-Hakbani and Dahshan (2015) [91], Daniel and Hongmei (2013) [92] and Moon et al [93]. As adapted based on insights received from Barfar et al [94], Figure 5 illustrates a basic (naïve) deployment of honeypots.…”
Section: Analysis-basedmentioning
confidence: 99%
“…On the other hand, the types of application-based defense mechanisms are much more numerous: client-puzzle [37], IRC-based [23], anomaly-based [10] [27], DNS tracking [25], and attack traffic suppression [24]. In addition to these traditional defense methods, advanced defense methods, such as reverse engineering [20] and honeypot [29] [31], also exist. We divide our literature review below into three parts.…”
Section: Related Workmentioning
confidence: 99%
“…A honeypot-based proactive defense is more effective and efficient for blocking DDoS attacks [29]. Moon et al introduced the hybrid honeypot system, which enables the ISP to find the C&C structured botnet before it initiates an attack.…”
Section: Reverse Engineering and Honeypotsmentioning
confidence: 99%
See 1 more Smart Citation
“…Botnets are detected using different characteristics of the network traffic, for example, using networks statistics , communication protocols , suspicious traffic behavior , graphical representations of behaviors , actions in honeypots , behavioral features , collaborative feedback in large networks and malicious actions . However, botnets evolve and thus make obsolete most detection methods.…”
Section: Introductionmentioning
confidence: 99%