SlideShare a Scribd company logo
1 of 9
IDENTIFY AND DEFEND BOTMASTER
         IN A NETWORK
  USING HONEYPOT TECHNIQUE

               Team Members:

                              A.M.R.Karthik
                                S.Alexander
                                   A.Edwin

 Department of Computer Science & Engineering
       Annai Vailankanni College of Engineering
                  Anna University of Technology

                              Guide: J.Jeba,M.E
                    Asst. Professor, Dept of CSE
Abstract

•A “botnet” consists of a network of compromised
computers(bots) controlled by an attacker(“botmaster”).

•Study of advanced botnet designs that could be
developed by botmasters in the near future.

•Compared with current botnets,the proposed botnet is
harder to be shut down, monitored, and hijacked.
Abstrat Contd…

• It provides


    Robust network connectivity

    Individualized encryption

    Control traffic dispersion

    Limited botnet exposure by each bot

    Easy monitoring and recovery by its botmaster
Existing System

• Compared to other Internet malware, the unique
  feature of a botnet lies in its control
  communication network.
• Bots in the botnet connect directly to some special
• C&C servers receive commands from their
  botmaster and forward them to the other bots in
  the network.
• From a botmaster’s perspective, the C&C servers
  are the fundamental weak points.
Drawbacks

• A botmaster will lose control of her botnet once
  the limited number of C&C servers are
  shutdown by defenders.
• Defenders could easily obtain the identities of
  all C&C servers based on their service traffic to
  a large number of bots, or simply from one
  captured bot.
• An entire botnet may be exposed once a C&C
  server in the botnet is hijacked or captured by
  defenders.
Proposed System

• The botnet requires no bootstrap
  procedure.
• Generate a robust botnet
• Prevent significant exposure of the
  network topology when some bots are
  captured by defenders.
• Prevent defenders from detecting bots via
  their communication traffic patterns.
Advantages
• The botnet communicates via the peer list
  contained in each bot.
• A botmaster could easily monitor the entire
  botnet by issuing a report command.
• Only bots with static global IP addresses that
  are accessible from the Internet are candidates
  for being in peer lists.
• Each servant bot listens on a self-generated
  service port for incoming connections from
  other bots.
System Requirements

• Software requirements:

      Front end            : jdk6
      Back end             : MySQL
      Operating system     : WINDOWS XP
                             Professional

• Hardware requirements:

       Hard disk           : 10 GB and above
       Ram                 : 512 MB and above
       Processor           : Pentium 4 and above
Identify and defend botmaster in a network

More Related Content

What's hot

What's hot (7)

A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet Detection
 
098
098098
098
 
Botnet
Botnet Botnet
Botnet
 
about botnets
about botnetsabout botnets
about botnets
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
Botnets
BotnetsBotnets
Botnets
 

Similar to Identify and defend botmaster in a network

2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
ericsuboy
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
UltraUploader
 

Similar to Identify and defend botmaster in a network (20)

Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
Meet Remaiten : Malware Builds Botnet on Linux based routers and potentially ...
 
Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
2014.7.9 detecting p2 p botnets through network behavior analysis and machine...
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
Detecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT BotnetsDetecting and Confronting Flash Attacks from IoT Botnets
Detecting and Confronting Flash Attacks from IoT Botnets
 
Lightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFALightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFA
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection Approaches
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Attack all the layers secure 360
Attack all the layers secure 360Attack all the layers secure 360
Attack all the layers secure 360
 
botnet.ppt
botnet.pptbotnet.ppt
botnet.ppt
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Hacker bootcamp
Hacker bootcampHacker bootcamp
Hacker bootcamp
 
Software Defined Network Implementation and Virtual Private Network Using NVGRE
Software Defined Network Implementation and Virtual Private Network Using NVGRESoftware Defined Network Implementation and Virtual Private Network Using NVGRE
Software Defined Network Implementation and Virtual Private Network Using NVGRE
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Identify and defend botmaster in a network

  • 1. IDENTIFY AND DEFEND BOTMASTER IN A NETWORK USING HONEYPOT TECHNIQUE Team Members: A.M.R.Karthik S.Alexander A.Edwin Department of Computer Science & Engineering Annai Vailankanni College of Engineering Anna University of Technology Guide: J.Jeba,M.E Asst. Professor, Dept of CSE
  • 2. Abstract •A “botnet” consists of a network of compromised computers(bots) controlled by an attacker(“botmaster”). •Study of advanced botnet designs that could be developed by botmasters in the near future. •Compared with current botnets,the proposed botnet is harder to be shut down, monitored, and hijacked.
  • 3. Abstrat Contd… • It provides  Robust network connectivity  Individualized encryption  Control traffic dispersion  Limited botnet exposure by each bot  Easy monitoring and recovery by its botmaster
  • 4. Existing System • Compared to other Internet malware, the unique feature of a botnet lies in its control communication network. • Bots in the botnet connect directly to some special • C&C servers receive commands from their botmaster and forward them to the other bots in the network. • From a botmaster’s perspective, the C&C servers are the fundamental weak points.
  • 5. Drawbacks • A botmaster will lose control of her botnet once the limited number of C&C servers are shutdown by defenders. • Defenders could easily obtain the identities of all C&C servers based on their service traffic to a large number of bots, or simply from one captured bot. • An entire botnet may be exposed once a C&C server in the botnet is hijacked or captured by defenders.
  • 6. Proposed System • The botnet requires no bootstrap procedure. • Generate a robust botnet • Prevent significant exposure of the network topology when some bots are captured by defenders. • Prevent defenders from detecting bots via their communication traffic patterns.
  • 7. Advantages • The botnet communicates via the peer list contained in each bot. • A botmaster could easily monitor the entire botnet by issuing a report command. • Only bots with static global IP addresses that are accessible from the Internet are candidates for being in peer lists. • Each servant bot listens on a self-generated service port for incoming connections from other bots.
  • 8. System Requirements • Software requirements: Front end : jdk6 Back end : MySQL Operating system : WINDOWS XP Professional • Hardware requirements: Hard disk : 10 GB and above Ram : 512 MB and above Processor : Pentium 4 and above