Characterisation of the Kelihos.B Botnet

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Citations (Scopus)
    96 Downloads (Pure)

    Abstract

    Botnets are organized networks of infected computers that are used for malicious purposes. An example is Kelihos.B, a botnet of the Kelihos family used primarily for mining bitcoins, sending spam and stealing bitcoin wallets. A large part of the Kelihos.B botnet was sinkholed in early 2012 and since then bots are sending requests to controlled servers. In this paper, we analyze and characterize the behavior of Kelihos. B. Our analysis is based on the log file of the bot request logged at the sinkhole from March 2012 to early November 2013. We investigate both the overall characteristics of the botnets, as well as on its evolution over time since the time of the sinkholing. Our results indicate that, although this trend is decreasing, there are possibly still newly infected bots even more than a year from the original sinkholing.
    Original languageUndefined
    Title of host publicationProceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014
    EditorsAnna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller
    Place of PublicationBerlin Heidelberg
    PublisherSpringer
    Pages79-91
    Number of pages13
    ISBN (Print)978-3-662-43861-9
    DOIs
    Publication statusPublished - 30 Jun 2014

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume8508
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Keywords

    • EWI-25302
    • METIS-309660
    • IR-93591

    Cite this

    Kerkers, M., Cardoso de Santanna, J. J., & Sperotto, A. (2014). Characterisation of the Kelihos.B Botnet. In A. Sperotto, G. Doyen, S. Latré, M. Charalambides, & B. Stiller (Eds.), Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014 (pp. 79-91). (Lecture Notes in Computer Science; Vol. 8508). Berlin Heidelberg: Springer. https://doi.org/10.1007/978-3-662-43862-6_11