2011
DOI: 10.1007/978-3-642-21153-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Honeynet Based Botnet Detection Using Command Signatures

Abstract: Abstract. Global Internet threats are undergoing a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. This alarming new class of attacks directly impacts the day to day lives of millions of people and endangers businesses and governments around the world. At the centre of many of these attacks is a large pool of compromised computers located in homes, schools, businesses, and governments around the world. Attackers use these zombie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…During that same time, global internet threats transitioned from disabling infrastructure to targeting people and organizations, endangering businesses and governments (Bhatia et al , 2011). Developments in technology included common security infrastructure and intrusion detection systems designed to detect multiple operating systems in information technology (Bhatia et al , 2011).…”
Section: Review Of the Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…During that same time, global internet threats transitioned from disabling infrastructure to targeting people and organizations, endangering businesses and governments (Bhatia et al , 2011). Developments in technology included common security infrastructure and intrusion detection systems designed to detect multiple operating systems in information technology (Bhatia et al , 2011).…”
Section: Review Of the Literaturementioning
confidence: 99%
“…During that same time, global internet threats transitioned from disabling infrastructure to targeting people and organizations, endangering businesses and governments (Bhatia et al , 2011). Developments in technology included common security infrastructure and intrusion detection systems designed to detect multiple operating systems in information technology (Bhatia et al , 2011). Honeypot data collection technologies, computer or network services used as traps for detecting and detouring robot networks (botnets), were discussed along with their developmental importance for the future of IS (Bhatia et al , 2011).…”
Section: Review Of the Literaturementioning
confidence: 99%
“…The primary goal of most Analysis-Based techniques is to detect, (and in some cases, prevent) the presence of botnets or bot activity in the network. One way by which this is achieved is by comparing certain characteristics of network traffic with a database of attributes (signatures) that have already been associated with specific botnet behaviours, such as those proposed by Zand et al [73], Bilge et al [74] and Bhatia et al [75]. Furthermore, as seen in the literature, another technique seeks to analyse network traffic for traffic/packets that exhibit behaviours that deviate from the normal, observable network behaviour (an anomaly), such as those proposed by Wang et al [76], Boukhtouta et al [77], Zhao et al [78] and Caglayan et al [79].…”
Section: Analysis-basedmentioning
confidence: 99%