Whispering Botnet Command and Control Instructions

被引:0
|
作者
Baden, Mathis [1 ]
Torres, Christof Ferreira [1 ]
Pontiveros, Beltran Borja Fiz [1 ]
State, Radu [1 ]
机构
[1] Univ Luxembourg, SnT, 29 Ave John F Kennedy, L-1855 Luxembourg, Luxembourg
关键词
blockchain; botnet; whisper; C&C;
D O I
10.1109/CVCBT.2019.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are responsible for many large scale attacks happening on the Internet. Their weak point, which is usually targeted to take down a botnet, is the command and control infrastructure: the foundation for the diffusion of the botmaster's instructions. Hence, botmasters employ stealthy communication methods to remain hidden and retain control of the botnet. Recent research has shown that blockchains can be leveraged for under the radar communication with bots, however these methods incur fees for transaction broadcasting. This paper discusses the use of a novel technology, Whisper, for command and control instruction dissemination. Whisper allows a botmaster to control bots at virtually zero cost, while providing a peer-to-peer communication infrastructure, as well as privacy and encryption as part of its dark communication strategy. It is therefore well suited for bidirectional botnet command and control operations, and creating a botnet that is very difficult to take down.
引用
收藏
页码:77 / 81
页数:5
相关论文
共 50 条
  • [1] Botnet command and control techniques
    Heron, Simon
    Network Security, 2007, 2007 (04) : 13 - 16
  • [2] Botnet Command and Control Mechanisms
    Zeidanloo, Hossein Rouhani
    Manaf, Azizah Abdul
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 564 - 568
  • [3] A hierarchical hybrid structure for botnet control and command
    Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Proc. - IEEE Int. Conf. Comput. Sci. Autom. Eng., CSAE, (483-489):
  • [4] Design of a Hybrid Command and Control Mobile Botnet
    Pieterse, Heloise
    Olivier, Martin
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 183 - 192
  • [5] Evaluating Bluetooth as a Medium for Botnet Command and Control
    Singh, Kapil
    Sangal, Samrit
    Jain, Nehil
    Traynor, Patrick
    Lee, Wenke
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 61 - 80
  • [6] Evaluating Email's Feasibility for Botnet Command and Control
    Singh, Kapil
    Srivastava, Abhinav
    Giffin, Jonathon
    Lee, Wenke
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 376 - 385
  • [7] Periodic Behavior in Botnet Command and Control Channels Traffic
    AsSadhan, Basil
    Moura, Jose M. F.
    Lapsley, David
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2157 - 2162
  • [8] Comparative Analysis and Evaluation of Botnet Command and Control Models
    Marupally, Pavan Roy
    Paruchuri, Vamsi
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 82 - 89
  • [9] A SURVEY OF BOTNET DETECTION TECHNIQUES BY COMMAND AND CONTROL INFRASTRUCTURE
    Hyslip, Thomas S.
    Pittman, Jason M.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2015, 10 (01) : 7 - 25
  • [10] Efficient Detect Scheme of Botnet Command and Control Communication
    Zeng, Jinquan
    Tang, Weiwen
    Liu, Caiming
    Hu, Jianbin
    Peng, Lingxi
    INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2012, 307 : 576 - +