Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

  • Authors:
  • Young Hoon Moon;Eunjin Kim;Suh Mahn Hur;Huy Kang Kim

  • Affiliations:
  • Center for Information Security Technologies (CIST), Graduate School of Information Security, Korea University, Seoul, South Korea;Kyonggi University, Suwon, Gyunggi-doSouth Korea;Solution Operation Team, Saint Security Co, Ltd., Seoul, South Korea;Center for Information Security Technologies (CIST), Graduate School of Information Security, Korea University, Seoul, South Korea

  • Venue:
  • Security and Communication Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

As botnets have become the primary means for cyber attacks, how to detect botnets becomes an important issue for researchers and practitioners. In this study, we introduce a system that is designed to detect botnets prior to their activation. Pre-detection of botnets becomes available with our enhanced honeypot system that allows us to intentionally infect virtual machines in honeynets. For empirical testing, we applied our system to a major Internet service provider in Korea. After running our proposed system for 12 months, it was found that nearly 40% of blacklisted botnets were pre-detected by our system before their attacks begin. We expect that our system can be used to detect command-and-control servers and to screen them out during their propagation stage before they make harmful attacks. Copyright © 2012 John Wiley & Sons, Ltd.