skip to main content
10.1145/2498328.2500094acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

An empirical study of botnets on university networks using low-interaction honeypots

Published:04 April 2013Publication History

ABSTRACT

Malware and Botnets in particular have risen to be premier threats to computing assets. As computer criminals continue to improve their attack methods it is essential that the security community have tools at their disposal to quickly identify and remediate these ever increasing attacks. Honeypots are increasingly becoming a tool of the trade as security administrators enhance their security and follow a security in depth model for combating security threats. In this thesis, we use interaction honeypots to study the attack behaviors of mobile devices on a "real-world" university wireless network. This research project will address this security issue by investigating effective solutions to identify compromised machines in a university network. The experimental results will presented based on using low interaction honeypots such as Honeyd in a live testing environment. In addition, various honeypots are tested and compared and our analysis will be documented as well.

References

  1. Ritu Tiwari and Abhishek Jain. 2012. Improving network security and design using honeypots. In Proceedings of the CUBE International Information Technology Conference (CUBE '12). ACM, New York, NY, USA, 847--852. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Reed, J. Geis and S. Dietrich, "SkyNet: a 3G-enabled mobile attack drone and stealth botmaster," in Proceedings of the 5th USENIX conference on Offensive technologies, Berkeley, CA, 2011 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An empirical study of botnets on university networks using low-interaction honeypots

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader