Skip to main content

2017 | OriginalPaper | Buchkapitel

Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots

verfasst von : Matej Zuzcak, Tomas Sochor

Erschienen in: Computer Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

New Internet threats emerge on daily basis and honeypots have become widely used for capturing them in order to investigate their activities. The paper focuses on a detailed analysis of the behavior of various attacks agains 7 Linux–based honeypots. The attacks were analyzed according to the threat type, session duration, AS, country and RIR of the attack origin. Clusters of similar objects were formed accordingly and certain typical attack patterns for potential detection automation as well as some aspects of threat dissemination were identified.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
3
Details about Kippo detection using the ps x command see in https://​github.​com/​desaster/​kippo/​issues/​39.
 
4
Possibilities of Kippo detection – see https://​github.​com/​desaster/​kippo/​issues/​190.
 
5
VirusTotal service – see http://​virustotal.​com/​.
 
6
CSIRT = Computer Security Incident Response Team.
 
7
Constituency means a part of the Internet where the CSIRT operates as an authority.
 
8
Only files with identical SHA1 hash were considered identical.
 
9
Details are available at http://​r-project.​org.
 
10
The unknown category includes ASes with no RIR data available. Usually this is the case for private ASes. Details can be found in IETF RFC 6996 – Autonomous System (AS) Reservation for Private Use available at https://​tools.​ietf.​org/​html/​rfc6996.
 
Literatur
1.
Zurück zum Zitat Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Cham (2014). doi:10.1007/978-3-319-07941-7_12 CrossRef Sochor, T., Zuzcak, M.: Study of internet threats and attack methods using honeypots and honeynets. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 118–127. Springer, Cham (2014). doi:10.​1007/​978-3-319-07941-7_​12 CrossRef
2.
Zurück zum Zitat Sochor, T., Zuzcak, M.: Attractiveness study of honeypots and honeynets in internet threat detection. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2015. CCIS, vol. 522, pp. 69–81. Springer, Cham (2015). doi:10.1007/978-3-319-19419-6_7 CrossRef Sochor, T., Zuzcak, M.: Attractiveness study of honeypots and honeynets in internet threat detection. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2015. CCIS, vol. 522, pp. 69–81. Springer, Cham (2015). doi:10.​1007/​978-3-319-19419-6_​7 CrossRef
3.
Zurück zum Zitat Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: Characterization of attackers’ activities in honeypot traffic using principal component analysis. In: 2008 Network and Parallel Computing, pp. 147–154. IEEE (2008). doi:10.1109/NPC.2008.82 Almotairi, S., Clark, A., Mohay, G., Zimmermann, J.: Characterization of attackers’ activities in honeypot traffic using principal component analysis. In: 2008 Network and Parallel Computing, pp. 147–154. IEEE (2008). doi:10.​1109/​NPC.​2008.​82
4.
Zurück zum Zitat Rieck, K., et al.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639–668 (2011)CrossRef Rieck, K., et al.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639–668 (2011)CrossRef
5.
6.
Zurück zum Zitat Skrzewski, M.: About the efficiency of malware monitoring via server-side honeypots. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2016. CCIS, vol. 608, pp. 132–140. Springer, Cham (2016). doi:10.1007/978-3-319-39207-3_12 Skrzewski, M.: About the efficiency of malware monitoring via server-side honeypots. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2016. CCIS, vol. 608, pp. 132–140. Springer, Cham (2016). doi:10.​1007/​978-3-319-39207-3_​12
7.
8.
Zurück zum Zitat Savenko, O., Lysenko, S., Kryshchuk, A., Klots, Y.: Botnet detection technique for corporate area network. In: 2013 Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), pp. 363–368. IEEE (2013). doi:10.1109/IDAACS.2013.6662707 Savenko, O., Lysenko, S., Kryshchuk, A., Klots, Y.: Botnet detection technique for corporate area network. In: 2013 Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), pp. 363–368. IEEE (2013). doi:10.​1109/​IDAACS.​2013.​6662707
9.
Zurück zum Zitat Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., Bobrovnikova, K.: A technique for the botnet detection based on DNS-traffic analysis. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2015. CCIS, vol. 522, pp. 127–138. Springer, Cham (2015). doi:10.1007/978-3-319-19419-6_12 CrossRef Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., Bobrovnikova, K.: A technique for the botnet detection based on DNS-traffic analysis. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2015. CCIS, vol. 522, pp. 127–138. Springer, Cham (2015). doi:10.​1007/​978-3-319-19419-6_​12 CrossRef
10.
Zurück zum Zitat Sochor, T., Zuzcak, M., Bujok, P.: Statistical analysis of attacking autonomous systems. In: International Conference on Cyber Security and Protection of Digital Services, pp. 1–6. IEEE (2016). doi:10.1109/ICUFN.2016.7537159 Sochor, T., Zuzcak, M., Bujok, P.: Statistical analysis of attacking autonomous systems. In: International Conference on Cyber Security and Protection of Digital Services, pp. 1–6. IEEE (2016). doi:10.​1109/​ICUFN.​2016.​7537159
11.
Zurück zum Zitat Spitzner, L.: Honeypots: Tracking Hackers, vol. 1. Addison-Wesley, Reading (2003) Spitzner, L.: Honeypots: Tracking Hackers, vol. 1. Addison-Wesley, Reading (2003)
12.
Zurück zum Zitat Fichet, B.: Distances and Euclidean distances for presence-absence characters and their application to factor analysis. In: Proceedings of a Workshop Multidimensional Data Analysis 1985, pp. 23–46. DSWO Press, Cambridge (1986) Fichet, B.: Distances and Euclidean distances for presence-absence characters and their application to factor analysis. In: Proceedings of a Workshop Multidimensional Data Analysis 1985, pp. 23–46. DSWO Press, Cambridge (1986)
13.
Zurück zum Zitat Jaccard, P.: Etude Comparative de la Distribution dans une Portion des Alpes et du Jura. Bulletin de la Societe Vaudoise des Sciences Naturelle 4 (1901) Jaccard, P.: Etude Comparative de la Distribution dans une Portion des Alpes et du Jura. Bulletin de la Societe Vaudoise des Sciences Naturelle 4 (1901)
14.
Zurück zum Zitat Guha, S., Rastogi, R., Shim, K.: ROCK: a robust clustering algorithm for categorical attributes. In: Proceedings of the 15th International Conference on Data Engineering (Cat. No. 99CB36337), pp. 512–521. IEEE (1999). doi:10.1109/ICDE.1999.754967 Guha, S., Rastogi, R., Shim, K.: ROCK: a robust clustering algorithm for categorical attributes. In: Proceedings of the 15th International Conference on Data Engineering (Cat. No. 99CB36337), pp. 512–521. IEEE (1999). doi:10.​1109/​ICDE.​1999.​754967
17.
Zurück zum Zitat Jolliffe, I.T.: Principal component analysis and factor analysis. In: Principal Component Analysis. Springer Series in Statistics, pp. 150–166. Springer, New York (2002) Jolliffe, I.T.: Principal component analysis and factor analysis. In: Principal Component Analysis. Springer Series in Statistics, pp. 150–166. Springer, New York (2002)
Metadaten
Titel
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots
verfasst von
Matej Zuzcak
Tomas Sochor
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-59767-6_10