DocumentCode :
3659075
Title :
Avoiding honeypot detection in peer-to-peer botnets
Author :
Meerah M. Al-Hakbani;Mostafa H. Dahshan
Author_Institution :
Department of Computer Engineering, College of Computer and Information Science, King Saud University, Riyadh, Saudi Aribia
fYear :
2015
fDate :
3/1/2015 12:00:00 AM
Firstpage :
1
Lastpage :
7
Abstract :
A botnet is group of compromised computers that are controlled by a botmaster, who uses them to perform illegal activities. Centralized and P2P (Peer-to-Peer) botnets are the most commonly used botnet types. Honeypots have been used in many systems as computer defense. They are used to attract botmasters to add them in their botnets; to become spies in exposing botnet attacker behaviors. In recent research works, improved mechanisms for honeypot detection have been proposed. Such mechanisms would enable bot masters to distinguish honeypots from real bots, making it more difficult for honeypots to join botnets. This paper presents a new method that can be used by security defenders to overcome the authentication procedure used by the advanced two-stage reconnaissance worm (ATSRW). The presented method utilizes the peer list information sent by an infected host during the ATSRW authentication process and uses a combination of IP address spoofing and fake TCP three-way handshake. The paper provides an analytical study on the performance and the success probability of the presented method. We show that the presented method provide a higher chance for honeypots to join botnets despite security measures taken by botmasters.
Keywords :
"IP networks","Peer-to-peer computing","Delays","Authentication","Computers","Grippers"
Publisher :
ieee
Conference_Titel :
Engineering and Technology (ICETECH), 2015 IEEE International Conference on
Type :
conf
DOI :
10.1109/ICETECH.2015.7275017
Filename :
7275017
Link To Document :
بازگشت