Visible to the public A Steganographic Approach to Localizing Botmasters

TitleA Steganographic Approach to Localizing Botmasters
Publication TypeConference Paper
Year of Publication2014
AuthorsRrushi, J.L.
Conference NameAdvanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on
Date PublishedMay
Keywordsbijective functions, Botmaster localization, botmaster machine, botnets, chaotic logistic map, computer network security, computer security, Computers, covert bits, Decoding, decoy word document, encoding, honey net, honey token, illegal drug dealer tracking, Internet, IP address, IP networks, law enforcement, marked money bills, Markov processes, object property, Organizations, perpetrator tracking, public key cryptography, secret cryptographic key, Servers, steganographic approach, steganography, Watermarking
Abstract

Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we discuss research that aims at providing law enforcement with the cyber counterpart of that approach in order to track perpetrators that operate botnets. We have devised a novel steganographic approach that generates a watermark hidden within a honey token, i.e. A decoy Word document. The covert bits that comprise the watermark are carried via secret interpretation of object properties in the honey token. The encoding and decoding of object properties into covert bits follow a scheme based on bijective functions generated via a chaotic logistic map. The watermark is retrievable via a secret cryptographic key, which is generated and held by law enforcement. The honey token is leaked to a botmaster via a honey net. In the paper, we elaborate on possible means by which law enforcement can track the leaked honey token to the IP address of a botmaster's machine.

DOI10.1109/WAINA.2014.152
Citation Key6844746