Botnet Abolish Using Honey pot Komal singh

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 3- May 2015
Botnet Abolish Using Honey pot
Komal singh
1M.Tech Student, Department of CSE, B.S.Anangpuria Institute of Technology and Management, Alampur, India
2Assistant Professor, Department of CSE, B.S.Anangpuria Institute of Technology and Management, Alampur,
India
ABSTRACT
Honeypots are a modern approach to network
security. Because “botnet” can be used for illicit
financial gain they have become quite popular in
internet attacks. ”Honeypot” have been successfully
deployed in many defense systems. Thus attacker
constructing and maintaining botnet will be forced to
find a many way to avoid honeypot traps.
Independent honeypot detection methodology based
on following assumption : security professional
deploying honeypot have liability constraints such
that they can’t allow there honeypotto practice in real
attacks. Based on this assumption ,attackers can’t
detect honeypot in their botnet by checking whether
the compromised machine in botnet can successfully
send out unmodified malicious traffic to attackers
,sensor or whether the compromised machine in
botnet can successfully send out unmodified
malicious traffic to attacker.
Keywords:- BOTNET , HONEYPOT, DDoS
INTRODUCTION
The rapid development of the Internet over the
past decade appeared to have facilitated an
increase in the incidents of online attacks .One
such powerful and harmful attack is the denial
of service (DoS) attack. A DoS attack
significantly threatens the network, especially if
such an attack is distributed. A distributed DoS
(DDoS) attack is launched by a mechanism
called Botnet through a network of controlled
computers. A software program controls the
computers and for specific purposes, known as
bots. Bots are small scripts that have been
designed to perform specific, automated
functions. Bots are utilized by agents for Web
indexing or spearing, as well as to collect online
product prices or to performing such duties as
chatting. However, bots are negatively
associated with remote access Trojan Horses
(e.g., Zeus bot) and zombie computers that are
created for less favorable purposes. Bots in large
quantities provide the power of a computer to
ISSN: 2231-5381
create prime tools for such activities as the
widespread delivery of SPAM email, click
fraud, spyware installation, virus and worm
dissemination, and DDoS attacks (e.g., black
energy bot) .DDoS attacks .usually take
advantage of the weaknesses of a network layer,
particularly, SYN, UDP, and Internet control
message protocol (ICMP) flooding. Such attacks
encroach the network bandwidth and resources
of the victim, thus facilitating the denial of
legitimate access.
BOTNETS BASED DDOS ATTACKS:
This section provides a background on Botnets
and how they facilitate DDoS attacks that
hamper the Web server. Botnets compromise a
network of machines with programs (usually
referred to as a bot, zombie, or drone) and
implement under a command and control (C&C)
management infrastructure. The management of
Botnets typically affects a series of systems
through numerous tools and through the
installation of a bot that can remotely control the
victim using Internet relay chat (IRC) . Present
Botnets are most frequently used to spread
DDoS attacks on the Web. Moreover, the
attackers can change their communication
approach during the creation of the bots.
Majority of bots varied its potentials to
participate in such attacks. The most typical and
commonly implemented Botnet attack on
application layer is the HTTP/S flooding attack,
which launches bots created by the HTTP
server. Such bots are thus called Web based bots
.The goal of a Botnet based DDoS attack is to
entail damage at the victim side. In general, the
ulterior motive behind this attack is personal
which means block the available resources
or degrade the performance of the service which
is required by the target machine. Therefore,
DDoS attack is committed for the revenge
purpose. Another aim to perform these attacks
can be to gainpopularity in the hacker
http://www.ijettjournal.org
Page 142
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 3- May 2015
community. In addition to this, these attacks can
and the agents. The terms handler and agents
also perform for the material gain, which means
are sometimes replaced with master and demons,
to break the confidentiality and use data for their
respectively, in descriptions of DDoStools .
use.
Fig:1BOTNET
BOTNET
BASED
ARCHITECTURE
DDOS
ATTACK
Botnet based DDoS attack networks fall under
three categories, namely, the agent-handler,
IRC-based, and Web-based models.
Agent-Handler Model
The agent-handler model[6] of a DDoS attack
comprises clients, handlers, and agents as shown
in fig.2 The client is one with whom the attacker
communicates in the DDoS attack system. The
handlers are software packages located
throughout the Internet. The client uses these
packages to communicate with the agents. The
agent software thrives in compromised systems,
eventually conducting the attack at the
appropriate time. The attacker communicates
with any of the handlers to identify operational
agents and to determine when to attack or to
upgrade agents. Owners and users of agent
systems are typically unaware that their system
has been compromised and is under a DDoS
attack. Depending on the configuration of the
DDoS attack network, agents can be instructed
to communicate with one handler or with
multiple handlers. Attackers often attempt to
install the handler software on a compromised
router or network server. The target typically
handles large volumes of traffic, making
message identification difficult between the
client and the handler and between the handler
ISSN: 2231-5381
Fig 2:AGENT HANDLER MODEL
 Internet Relay Chat (IRC) Model
The architectures of the IRC-based[6]DDoS
attack as shown in Figure 3 and of the agent–
handler model are almost similar. However,
instead of employing a handler program that is
installed on a network server, the client is
connected to the agents through an IRC
communication channel. An IRC channel
benefits an attacker with the use of legitimate
IRC ports to send commands to agents. The use
of legitimate portshinders the tracking DDoS
command packets. Additionally, IRC servers
tend to have large volumes of traffic, enabling
an attacker to conceal its presence easily. The
attacker does not necessarily maintain a list of
the agents because it can immediately enter the
IRC server and view all available agents . The
agent software in the IRC network sends and
receives messages through the IRC channel and
informs the attacker when an agent becomes
operational.
Web-based Model
Although the most preferred method for Botnet
command and control (C&C) is the IRC-based
model, Web-based[6] reporting and command
has emerged over the past few years. A number
of bots in the Web-based model simply report
statistics to a
http://www.ijettjournal.org
Page 143
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 3- May 2015
Catching False negatives:
Catching false negatives with the help of
honeypots is quiet easy because every
connection made to honeypot is considered
unauthorized. Traditional attack detecting tools
becomes fail in detecting new attacks like
signature based detection tools. These tools
detect only those attacks whose signatures are
already in their database. As per honeypot’s
approach, there is no need of predefined
database.
 Encryption:
Honeypots have the capability to capture the
malicious activity if it is in encrypted form.
Figure 3 INTERNET RELAY CHAT
Encrypted probes and attacks interact with the
honeypots as end point where the activity is
decrypted by the honeypot.
Web site, whereas others are intended to be fully
 Working with IPv6
configured and controlled through complex PHP
Honeypots work in any IP environment,
scripts and encrypted communications over the
including IPv6. IPv6 is the new version of IPv4
80/443 port and the HTTP/HTTPS protocol. The
and actively used by the countries like Japan and
following are the advantages of Web-based
the department of defense. Many current
controls over IRC Ease of set-up and website
technologies like firewalls and Ids sensors do
configuration; improved reporting and command
not work on IPv6.
functions; less bandwidth requirement and the
Flexible :
acceptance of large Botnets for the distributed
Honeypots are extremely adaptable in variety of
load;
environments. From a social security number
Concealment of traffic and hindrance of filtering
embedded into a database, to an entire network
through the use of port 80/443; Resistance to
of computers designed to be broken into.
Botnet hijacking via chat-room hijacking; and
Minimal Resources:
Ease of use and of acquisition.
Honeypot require minimal resources. A simple
Pentium computer can monitor millions of IP
ADVANTAGES OF HONEYPOTS
addresses.
Being a part of network security mechanism
DISADVANTAGES OF HONEYPOTS
honeypots have many advantages. Here we will
Single Data Point:
highlight some specialties of honeypots.
One huge drawback is generally faced by
Small data sets:
honeypots that they are worthless if no one
Any connection made with the honeypot is
attacks them. Obviously, they can accomplish
considered asmalicious. So the thousands of
wonderful things but if the attacker doesn’t send
alerts logged byorganizations can be reduced to
any packet to honeypots then it would blissfully
hundreds of entries.
unaware of any unauthorized activity.
Risk:
 Reduced False Positives:
Once compromised , honeypots can introduce
Honeypots help in reducing false positives. The
risk to organization’s environment. Different
larger the probability that a security resource
kind of honeypots possess different levels of
produce false positives or false alerts the less
risk. Low interact.
likely the technology will be deployed. Any
CONCLUSION
activity with the honeypot is considered
This study on botnet activities examines most
dangerous and making it efficient in detecting
popular botnet types in the network and
attacks.
evolution towards decentralized sophisticated
types of malicious networks with variety of
ISSN: 2231-5381
http://www.ijettjournal.org
Page 144
International Journal of Engineering Trends and Technology (IJETT) – Volume23 Number 3- May 2015
infection mechanism, one of them is obvious
and potentially dangerous – infection through
popular websites. Close inspection of website
code may be done both in server and remotely,
that allows implement various independent tools
both for site users and administrators. Log
analysis and anomaly based traffic detection
methods (such as too many connections or
unexpected source address ranges) may provide
informationabout suspicious activities in
possible compromised website. With different
automation levels and different degree of false
positives all suggested detection method may be
used successfully together or separately.
References
1.
2.
3.
4.
5.
6
7
Navneet Kambow et al, / (IJCSIT) International
Journal of Computer Science and Information
Technologies, Vol. 5 (5)2014, 6098-6101Honeypots:
The Need of Network SecurityNavneet Kambow#,
Lavleen Kaur Passi
Honeypot-Aware Advanced Botnet Construction and
Maintenance Cliff C. Zou Ryan Cunningham School
of Electrical Engineering and Computer Science
University of Central Florida Orlando, FL 32816-2362
{czou,rcunning}@cs.ucf.edu.
Data Mining for Security ApplicationsBhavani
Thuraisingham, Latifur Khan, Mohammad M. Masud,
Kevin W. HamlenThe University of Texas at
Dallas{bhavani.thuraisingham,lkhan,mehedy,hamlen}
@utdallas.edu
International Journal of Scientific and Research
Publications, Volume 3, Issue 8, August 2013 1 ISSN
2250-3153
www.ijsrp.orgWEB
BASED
HONEYPOTS NETWORKSrivathsa S Rao#1,Vinay
Hegde#2 , Boruthalupula Maneesh#3, Jyothi Prasad N
M#4, Suhas Suresh#5.
Int. J. Information and Computer Security, Vol. x, No.
x, xxxx Honeypot Detection in Advanced
BotnetAttack Ping Wang, Lei Wu, Ryan
Cunningham,Cliff C. Zou
International Journal of Computer Applications (0975
– 8887) Volume 49– No.7, July 2012 24Botnet-based
Distributed Denial
of Service (DDoS) Attacks on
Web Servers: Classification and Art
B.B Gupta, M Misra R C.joshi, FVBA A combined
statistical approach for Low Rate Degrading and high
bandwidth disruptive DDOS Attack detection in
ISPDomain,|| in theproceeding of 16th IEEE
international conference onNetwork (ICON-1008),
DOI:10:1109/ICON:2008.4772654,New
Delhi,INDIA,2008
ISSN: 2231-5381
http://www.ijettjournal.org
Page 145
Download