Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Tracking BOTNETS using Virtual HONEYPOTS

P. Subhapriya, V. Subashini, A. Umamaheswari


The technology is developed in our day-to-day life, in which our distributed area was increasing rapidly thereby global internet threat are also increasing, where one of the threat is caused by BOTNET activities. Apart from firewalls and intrusion detection system (IDS), HONEYPOT has received much attention in recent years. We examine various types of honeypots, and deception techniques they used to counter attacks. In this survey paper we provide a look at how Honeypot works in Botnet activities. There are many methods that botnet could able to find the honeypot arrival. So, we here assume that by hiding honeypot from botnet, we can easily be able to detect the botnet.


Honeypot, Botnet, IDS, DDoS, IRC, C&C, Zombies

Full Text:



Neal Krawetz (Hacker Factor Solutions), “Anti-Honeypot Technology”, IEEE Security and Privacy, 2004.

L. Spitzner, Honeypots: Tracking Hackers, Addison-Wesley, 2002.

C. Seifert, I. Welch, and P. Komisarczuk. HoneyC – The Low-Interaction Client Honeypot. In NZCSRCS, Hamilton, 2007.

Eirik Falh Georg Bergande, Jon Fjeldberg Smedsrud, “Using Honeypots to analyse Bots and Botnets”, NTNU Innovation and Creativity, 2007.

G. Pradeep Reddy, A. Anada Roa, “An implementation of Botnet detection algorithm for grid networks”, International Journal Communication and Network Security (IJCNS), Volume I, Issue II, 2011.

Jae-Seo Lee, HyunCheol Jeong, Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh, “The Activity Analysis of Malicious HTTP based Botnets using Degree of Periodic Repeatability”, IEEE International Conference on Security Technology, 2008.

Bogdan Botezatu, “Anatomy of a Botnet”, MalwareCityNews, Sep. 15, 2008.

“Botnets: The New Threat Landscape”, CISCO White Paper.

Fatima Naseem, Mariam shafqat, Umbreen Sabir, Asim Shahzad, “A Survey of Botnet Technology and

Detection”, International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 10 No: 01.

Christian Seifert, Ian Welch, Peter Komisarczuk, “Application of divide and conquer algorithm paradigm to improve the detection speed of high interaction client honeypots”.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.