%0 Conference Proceedings %T Characterisation of the Kelihos.B Botnet %+ University of Twente %A Kerkers, Max %A Santanna, José, Jair %A Sperotto, Anna %Z Part 4: Experimental Studies for Security Management %< avec comité de lecture %( Lecture Notes in Computer Science %B 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) %C Brno, Czech Republic %Y Anna Sperotto %Y Guillaume Doyen %Y Steven Latré %Y Marinos Charalambides %Y Burkhard Stiller %I Springer %3 Monitoring and Securing Virtualized Networks and Services %V LNCS-8508 %P 79-91 %8 2014-06-30 %D 2014 %R 10.1007/978-3-662-43862-6_11 %K Botnet %K Kelihos.B %K Hlux2 %K Characterisation %K Sinkhole %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Botnets are organized networks of infected computers that are used for malicious purposes. An example is Kelihos.B, a botnet of the Kelihos family used primarily for mining bitcoins, sending spam and stealing bitcoin wallets. A large part of the Kelihos.B botnet was sinkholed in early 2012 and since then bots are sending requests to controlled servers. In this paper, we analyze and characterize the behavior of Kelihos. B. Our analysis is based on the log file of the bot request logged at the sinkhole from March 2012 to early November 2013. We investigate both the overall characteristics of the botnets, as well as on its evolution over time since the time of the sinkholing. Our results indicate that, although this trend is decreasing, there are possibly still newly infected bots even more than a year from the original sinkholing. %G English %Z TC 6 %Z WG 6.6 %2 https://inria.hal.science/hal-01401294/document %2 https://inria.hal.science/hal-01401294/file/978-3-662-43862-6_11_Chapter.pdf %L hal-01401294 %U https://inria.hal.science/hal-01401294 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-AIMS %~ IFIP-WG6-6 %~ IFIP-LNCS-8508