A Steganographic Approach to Localizing Botmasters
Title | A Steganographic Approach to Localizing Botmasters |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Rrushi, J.L. |
Conference Name | Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on |
Date Published | May |
Keywords | bijective functions, Botmaster localization, botmaster machine, botnets, chaotic logistic map, computer network security, computer security, Computers, covert bits, Decoding, decoy word document, encoding, honey net, honey token, illegal drug dealer tracking, Internet, IP address, IP networks, law enforcement, marked money bills, Markov processes, object property, Organizations, perpetrator tracking, public key cryptography, secret cryptographic key, Servers, steganographic approach, steganography, Watermarking |
Abstract | Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we discuss research that aims at providing law enforcement with the cyber counterpart of that approach in order to track perpetrators that operate botnets. We have devised a novel steganographic approach that generates a watermark hidden within a honey token, i.e. A decoy Word document. The covert bits that comprise the watermark are carried via secret interpretation of object properties in the honey token. The encoding and decoding of object properties into covert bits follow a scheme based on bijective functions generated via a chaotic logistic map. The watermark is retrievable via a secret cryptographic key, which is generated and held by law enforcement. The honey token is leaked to a botmaster via a honey net. In the paper, we elaborate on possible means by which law enforcement can track the leaked honey token to the IP address of a botmaster's machine. |
DOI | 10.1109/WAINA.2014.152 |
Citation Key | 6844746 |
- internet
- Watermarking
- Steganography
- steganographic approach
- Servers
- secret cryptographic key
- public key cryptography
- perpetrator tracking
- Organizations
- object property
- Markov processes
- marked money bills
- law enforcement
- IP networks
- IP address
- bijective functions
- illegal drug dealer tracking
- honey token
- honey net
- encoding
- decoy word document
- Decoding
- covert bits
- Computers
- computer security
- computer network security
- chaotic logistic map
- botnets
- botmaster machine
- Botmaster localization