An empirical study of botnets on university networks using low-interaction honeypots

  • Authors:
  • Daniel Andrew;Hongmei Chi

  • Affiliations:
  • Florida A&M University, Tallahassee, FL;Florida A&M University, Tallahassee, FL

  • Venue:
  • Proceedings of the 51st ACM Southeast Conference
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware and Botnets in particular have risen to be premier threats to computing assets. As computer criminals continue to improve their attack methods it is essential that the security community have tools at their disposal to quickly identify and remediate these ever increasing attacks. Honeypots are increasingly becoming a tool of the trade as security administrators enhance their security and follow a security in depth model for combating security threats. In this thesis, we use interaction honeypots to study the attack behaviors of mobile devices on a "real-world" university wireless network. This research project will address this security issue by investigating effective solutions to identify compromised machines in a university network. The experimental results will presented based on using low interaction honeypots such as Honeyd in a live testing environment. In addition, various honeypots are tested and compared and our analysis will be documented as well.