Building an Anti-Botnet Platform to Mitigate Botnet

نویسندگان

  • SHIAN-SHYONG TSENG
  • AI-CHIN LU
  • NAI-WEN HSU
  • GENG-DA TSAI
چکیده

In recent years, with the rapid growth of the Internet applications and services, botnet becomes one of the most severe threats on the Internet. Because the botnets can be automatically evolved as different localized versions in a short period of time, how to find an effective and efficient approach to detect and notify the Botnet attack becomes an important and interesting issue. To cope with the issue, we proposed a collective intelligence approach which aims to enable the systematic and dynamic creation of malware information and knowledge. Accordingly, we developed an anti-botnet platform together with a social networking structure, and an anti-botnet service web site, where the collaborative anti-botnet platform is used to collect the Botnet attack information through the Honeypot Deployment of different organizations and the proposed social networking structure can help build the consensus to select the attributes of the Botnet. The collected data can be then sent to the Anti-Virus Software Vendor to develop the antidote which can be free downloaded by the infected Internet users. Besides, an anti-botnet web site is also developed for Botnet information query, and malware prevention teaching. According to the experimental results, we show that the platform can be used to reduce the Botnet and malware attacks, and the collected information and knowledge can be used to enhance the national information and communication security. Key-Words: Anti-Botnet Platform, Honeypot, Botnet, collective intelligence, social networking, consensus building

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BotOnus: an online unsupervised method for Botnet detection

Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...

متن کامل

BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

متن کامل

Proactive Botnet Countermeasures An Offensive Approach

Botnets, consisting of thousands of interconnected, remote-controlled computers, pose a big threat against the Internet. We have witnessed the involvement of such malicious infrastructures in politically motivated attacks more than once in recent years. Classical countermeasures are mostly reactive and conducted as part of incident response actions. This is often not sufficient. We argue that p...

متن کامل

Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm

Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, the first botnets that use peer-to-peer (P2P) networks for remote control of the compromised machines appeared in the wild recently. In this paper, w...

متن کامل

Adaptability of IRC Botnet Detection Method to P2P Botnet Detection

This report mainly discusses the adaptability of the IRC-based Bot detection method to be used in the P2P-based Bot detection. The first section introduces the IRC-based bot and the newly appeared P2P-based bot to see their difference. The second section shows the related work and the traditional method of BOTNET detection. The third section discusses the methodology used by the IRC based Botne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012