Collecting and Analyzing Bots in a Systematic Honeynet-based Testbed Environment
ثبت نشده
چکیده
Networks of compromised machines called botnets are one of the most threatening adversaries over the Internet due in large part to the difficulty of identifying botnet traffic patterns. We have witnessed that existing signature-based detection and protection methods are ineffective in dealing with new unknown bots. By slightly modifying the code of an existing bot, bot commanders can bypass most signature based mechanisms. We believe that by analyzing bot traffic for malicious patterns, it is possible to develop a taxonomy of bot characteristics and in turn use these characteristics to develop risks which will ultimately be used in the decision making process of allowing or blocking traffic. In this paper, we introduce our Honeynet-based Bot Analysis Architecture which is the first step towards our Risk-Aware Network-centric Malware Detection and Prevention Framework. We discuss our current architecture and how it could be realized towards identifying unknown bots and other malware. In addition, we discuss our results and lessons learned from this work. Index Terms – Network Security, Botnet Analysis, Honeynet
منابع مشابه
Scalable Honeynet Based on Artificial Intelligence Utilizing Cloud Computing
The Honeynet is not a single system but a network sits behind a firewall where all inbound and outbound data is contained, captured and controlled. The Honeynet has two main components, data control and data capture. Data control is the way of filtering and allowing data flow and data capturing is collecting information for analyzing later on. The analysis is using the information which is coll...
متن کاملA framework for attack patterns’ discovery in honeynet data
Collecting data related to Internet threats has now become a relatively common task for security researchers and network operators. However, the huge amount of raw data can rapidly overwhelm people in charge of analyzing such data sets. Systematic analysis procedures are thus needed to extract useful information from large traffic data sets in order to assist the analyst’s investigations. This ...
متن کاملDynamic Deploying Distributed Low-interaction Honeynet
Distributed virtual honeynet is an important security detection system to Worms, Botnet detection, Spam and Distributed Denial-Of-Service. The honeynet value significantly relies on the disguise capacity. The traditional deploying method is a static scheme that the configuration of honeynet is determined by security experts beforehand and unable to change after the deployment. The hackers or Bo...
متن کاملUnderstanding a prospective approach to designing malicious social bots
The security implications of social bots are evident in consideration of the fact that data sharing and propagation functionality are well integrated with social media sites. Existing social bots primarily use RSS (Really Simple Syndication) and OSN (Online Social Network) APIs to communicate with OSN servers. Researchers have profiled their behaviors well, and have proposed various mechanisms ...
متن کاملAnalyzing the Role of the Concept of Urban Socialization in the Urban Public Space Based on the Status of Human Dignity
Human dignity is a concept that can have a significant impact on urban public space. In this sense, it speaks of the value of human beings and their status as a thoughtful and spiritual being. Discovering this valuable feeling in an environment that is widely used by citizens is important to the research. The subjective and interactive nature of this phenomenon The purpose of this study was to ...
متن کامل