Spelling suggestions: "subject:"honeynet"" "subject:"honeybees""
1 |
State of the Art Botnet-Centric Honeynet DesignSyers, John, III 16 January 2010 (has links)
The problem of malware has escalated at a rate that security professionals and
researchers have been unable to deal with. Attackers savage the information technology (IT) infrastructure of corporations and governments with impunity. Of particular
significance is the rise of botnets within the past ten years. In response, honeypots
and honeynets were developed to gain critical intelligence on attackers and ultimately
to neutralize their threats. Unfortunately, the malware community has adapted, and
strategies used in the early half of the decade have diminished significantly in their
effectiveness. This thesis explores the design characteristics necessary to create a
honeynet capable of reversing the current trend and defeating botnet countermeasures. This thesis finds that anti-virtual machine detection techniques along with
appropriate failsafes are essential to analyze modern botnet binaries.
|
2 |
Honeynet design and implementationArtore, Diane 20 December 2007 (has links)
Over the past decade, webcriminality has become a real issue. Because they allow the botmasters to control hundreds to millions of machines, botnets became the first-choice attack platform for the network attackers, to launch distributed denial of service attacks, steal sensitive information and spend spam emails.
This work aims at designing and implementing a honeynet, specific to IRC bots. Our system works in 3 phasis: (1) binaries collection, (2) simulation, and (3) activity capturing and monitoring. Our phase 2 simulation uses an IRC redirection to extract the connection information thanks to a IRC redirection (using a DNS redirection and a "fakeserver"). In phase 3, we use the information previously extracted to launch our honeyclient, which will capture and monitor the traffic on the C&C channel.
Thanks to our honeynet, we create a database of the activity of IRC botnets (their connection characteristics, commands on the C&C ), and hope to learn more about their behavior and the underground market they create.
|
Page generated in 0.0331 seconds