Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 236))

Abstract

Botnet Emulation is an emerging method to research on Botnet which is attracting widespread attention. It is referred to build a closed Botnet with virtualization technology to do analysis on Botnet. Although superior to other traditional methods for its flexibility, reproducibility, validity as well as lawfulness, Botnet Emulation is facing challenges from security, transparency, scale and so on. In this paper, we shed light on some of the key challenges in building Botnet Emulation systems. Furthermore, we discuss various techniques used to address or alleviate these problems, along with the pros and cons of each technique. We hope to motivate future research in this area to develop practical solutions to these challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhu, Z., Lu, G., Chen, Y., Fu, Z.J., Roberts, P., Han, K.: Botnet research survey. Northwestern University, Evanston (IEEE) (2008)

    Google Scholar 

  2. Seifert, C., Endicott-Popovsky, B., Frincke, D., Komisarczuk, P., Muschevici, R., Welch, I.: Justifying the need for forensically ready protocols: a case study of identifying malicious web servers using client honeypots, vol. 11, no. 1 (2008)

    Google Scholar 

  3. Jiang, X., Wang, X.: Out-of-the-Box Monitoring of VM-based High-Interaction Honeypots. Springer, Heidelberg (2007)

    Google Scholar 

  4. Alosefer, Y., Rana, O.: Clustering client honeypot data to support malware analysis. Knowledge-Based and Intelligent Information and Engineering Systems. Lecture Notes in Computer Science, vol. 6279, pp. 556–565 (2010)

    Google Scholar 

  5. Spitzner, L.: Definition and value of honeypots. http://www.tracking-hackers.com/papers/honeypots.hmtl

  6. Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. Indiana University, Bloomington (2005)

    Google Scholar 

  7. Levine, J., LaBella, R., Owen, H., Contis, D., Culver, B.: The use of honeynets to detect exploited systems across large enterprise networks. In: IEEE 4th Annual Information Assurance Workshop, West Point, NY, June (2003)

    Google Scholar 

  8. Barford, P., Blodgett, M.: Toward botnet mesocosms. University of Wisconsin-Madison, Madison (2007)

    Google Scholar 

  9. Benzel, T., Braden, R., Kim, D., Neuman, C., Joseph, A., Sklower, K., Ostrenga, R., Schwab, S.: Experience with deter: a testbed for security research. In: Testbeds and research infrastructures for the development of networks and communities, TRIDENTCOM 2006. 2nd international conference on, 2006, p. 10 (2006)

    Google Scholar 

  10. Benzel, T., Braden, R., Kim, D., Neuman, C., Joseph, A., Sklower, K., et al.: Experience with deter: a testbed for security research. In: Testbeds and Research Infrastructures for the Development of Networks and Communities, TRIDENTCOM 2006. 2nd International Conference on, Pub Place: IEEE, Barcelona, pp. 379–388 (2006)

    Google Scholar 

  11. Jackson, A.W., Lapsley, D., Jones, C., Zatko, M., Golubitsky, C., Strayer, W.T.: SLINGbot: A system for live investigation of next generation botnets. In: Conference For Homeland Security, CATCH '09. Cybersecurity Applications & Technology, Pub Place: IEEE, Washington, DC, pp. 313–318 (2009)

    Google Scholar 

  12. Minnich, R., Rudish, D.: Ten million and one penguins, or, lessons learned from booting millions of virtual machines on HPC systems (2009)

    Google Scholar 

  13. Emulating a Million Machines to investigate Botnets. http://www.hpcs2010.org/

  14. Calvet, J., Davis, C.R., Fernandez, J.M., Marion, J.Y., St-Onge, P.L., Guizani, W., et al.: The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, Pub Place: ACM. New York, pp.141-150 (2010)

    Google Scholar 

  15. OpenVZ density. http://zh.wikipedia.org/wiki/OpenVZ#.E5.AF.86.E5.BA.A6

  16. Nelson Elhage, Virtunoid. A KVM Guest: Host privilege escalation exploit. Black Hat USA 2011

    Google Scholar 

  17. Cheng, G., Zou, D.Q., Li, M., Ji, C.: Trusted lightweight VMM based security architecture. Jisuanji Yingyong Yanjiu 27(8), 3045–3049 (2010)

    Google Scholar 

  18. Waledac Botnet. http://en.wikipedia.org/wiki/Waledac_botnet

  19. Libvirt. http://libvirt.org

  20. Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility is not transparency: VMM detection myths and realities (2007)

    Google Scholar 

  21. Kennell, R., Jamieson, L.H.: Establishing the genuinity of remote computer systems. In: Proceedings of the 12th USENIX Security Symposium, Pub Place: USENIX Association, Washington, DC, pp.295–310 (2003)

    Google Scholar 

  22. Thompson, C., Huntley, M., Link, C.: Virtualization detection: new strategies and their effectiveness

    Google Scholar 

  23. DAMBALLA, Top 10 Botnet Threat Report, 2010

    Google Scholar 

Download references

Acknowledgments

This study is supported by the Hi-tech Research and Development Program of China (863 Program) under Grant No.2011AA01A205, the National Natural Science Foundation of China under Grant No.61003015, the Doctoral Fund of Ministry of Education of China under Grant No.20101102110018, the National “Core electronic devices high-end general purpose chips and fundamental software” project under Grant No.2010ZX01036-001-001, and the National Natural Science Foundation of China under Grant No. 60973008.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Lin, B., Hao, Q., Xiao, L., Ruan, L., Zhang, Z., Cheng, X. (2013). Botnet Emulation: Challenges and Techniques. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_100

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7010-6_100

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7009-0

  • Online ISBN: 978-1-4614-7010-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics