• DocumentCode
    759052
  • Title

    Botnets: big and bigger

  • Author

    McCarty, B.

  • Author_Institution
    Azusa Pacific University
  • Volume
    1
  • Issue
    4
  • fYear
    2003
  • Firstpage
    87
  • Lastpage
    90
  • Abstract
    Researchers design honeynet computer networks specifically to be attacked. The hosts that comprise a honeynet and serve as attack targets are called honeypots. Researchers configure them to capture a variety of useful data about computer attacks without compromising other computers. Moreover, honeynet researchers strive to implement data capture and control in such a way that intruders are unaware that their actions are being monitored. Although honeynet technology is relatively new, it is developing rapidly. Honeynets have already proven themselves to be useful sources of information. In this article, I´ll describe an attack on a honeypot that occurred in March 2003 during the onset and peak activity of several worms that targeted vulnerable hosts running Windows file sharing. We incorporated the compromised honeypot into a large botnet that attackers used to initiate distributed denial-of-service (DDOS) attacks against several Internet sites. I explain the structure of such botnets, their use by computer attackers, and the threat they pose to Internet sites.
  • Keywords
    computer networks; security of data; AD 2003.03; DDoS attacks; Windows file sharing; botnet; computer attacks; data capture; distributed denial-of-service attacks; honeynet computer networks; honeypots; Computer security; Computer worms; Data security; Internet; Intrusion detection; Network servers; Operating systems; Privacy; Switches; Web server;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSECP.2003.1219079
  • Filename
    1219079