1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jait@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

Nepenthes Honeypots Based Botnet Detection

Sanjeev Kumar1, Rakesh Sehgal1, Paramdeep Singh1, and Ankit Chaudhary2
1. Cyber Security Technology Division, C-DAC, Mohali, INDIA
2. Dept. of Computer Science, BITS Pilani, INDIA
Abstract—the numbers of the botnet attacks are increasing day by day and the detection of botnet spreading in the network has become very challenging. Bots are having specific characteristics in comparison of normal malware as they are controlled by the remote master server and usually don’t show their behavior like normal malware until they don’t receive any command from their master server. Most of time bot malware are inactive, hence it is very difficult to detect. Further the detection or tracking of the network of theses bots requires an infrastructure that should be able to collect the data from a diverse range of data sources and correlate the data to bring the bigger picture in view.In this paper, we are sharing our experience of botnet detection in the private network as well as in public zone by deploying the nepenthes honeypots. The automated framework for malware collection using nepenthes and analysis using antivirus scan are discussed. The experimental results of botnet detection by enabling nepenthes honeypots in network are shown. Also we saw that existing known bots in our network can be detected.

Index Terms—Malware, Bots, Network Security, Nepenthes, Honeypots, Privacy

Cite: Sanjeev Kumar, Rakesh Sehgal, Paramdeep Singh, and Ankit Chaudhary, "Nepenthes Honeypots Based Botnet Detection," Journal of Advances in Information Technology, Vol. 3, No. 4, pp. 215-221, November, 2012.doi:10.4304/jait.3.4.215-221
Copyright © 2013-2020. JAIT. All Rights Reserved
Creative Commons LicenseThis work is licensed under the Creative Commons Attribution License (CC BY-NC-ND 4.0)