Title
Honeypot-Aware Advanced Botnet Construction And Maintenance
Abstract
Because "botnets" can be used for illicit financial gain, they have become quite popular in recent Internet attacks. "Honeypots" have been successfully deployed in many defense systems. Thus, attackers constructing and maintaining botnets will be forced to find ways to avoid honeypot traps. In this paper, we present a hardware and software independent honeypot detection methodology based on the following assumption: security professionals deploying honeypots have liability constraints such that they cannot allow their honeypots to participate in real (or too many real) attacks. Based on this assumption, attackers can detect honeypots in their botnet by checking whether the compromised machines in the botnet can successfully send out unmodified malicious traffic to attackers' sensors or whether the bot controller in their botnet can successfully relay potential attack commands. In addition, we present a novel "two-stage reconnaissance" worm that can automatically construct a peer-to-peer structured botnet and detect and remove infected honeypots during its propagation stage. Finally, we discuss some guidelines for defending against the general honeypot-aware attacks. © 2006 IEEE.
Publication Date
12-22-2006
Publication Title
Proceedings of the International Conference on Dependable Systems and Networks
Volume
2006
Number of Pages
199-208
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/DSN.2006.38
Copyright Status
Unknown
Socpus ID
33845590556 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/33845590556
STARS Citation
Zou, Cliff C. and Cunningham, Ryan, "Honeypot-Aware Advanced Botnet Construction And Maintenance" (2006). Scopus Export 2000s. 7494.
https://stars.library.ucf.edu/scopus2000/7494