Whispering Botnet Command and Control Instructions

被引:0
|
作者
Baden, Mathis [1 ]
Torres, Christof Ferreira [1 ]
Pontiveros, Beltran Borja Fiz [1 ]
State, Radu [1 ]
机构
[1] Univ Luxembourg, SnT, 29 Ave John F Kennedy, L-1855 Luxembourg, Luxembourg
关键词
blockchain; botnet; whisper; C&C;
D O I
10.1109/CVCBT.2019.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are responsible for many large scale attacks happening on the Internet. Their weak point, which is usually targeted to take down a botnet, is the command and control infrastructure: the foundation for the diffusion of the botmaster's instructions. Hence, botmasters employ stealthy communication methods to remain hidden and retain control of the botnet. Recent research has shown that blockchains can be leveraged for under the radar communication with bots, however these methods incur fees for transaction broadcasting. This paper discusses the use of a novel technology, Whisper, for command and control instruction dissemination. Whisper allows a botmaster to control bots at virtually zero cost, while providing a peer-to-peer communication infrastructure, as well as privacy and encryption as part of its dark communication strategy. It is therefore well suited for bidirectional botnet command and control operations, and creating a botnet that is very difficult to take down.
引用
收藏
页码:77 / 81
页数:5
相关论文
共 50 条
  • [31] A Framework for Detecting Botnet Command and Control Communication over an Encrypted Channel
    Ismail, Zahian
    Jantan, Aman
    Yusoff, Mohd Najwadi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 319 - 326
  • [32] Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection
    Seo, Ilju
    Lee, Heejo
    Han, Seung Chul
    COMPUTERS & SECURITY, 2014, 46 : 141 - 153
  • [33] CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
    Dietrich, Christian J.
    Rossow, Christian
    Pohlmann, Norbert
    COMPUTER NETWORKS, 2013, 57 (02) : 475 - 486
  • [34] Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
    Kartaltepe, Erhan J.
    Morales, Jose Andre
    Xu, Shouhuai
    Sandhu, Ravi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 511 - +
  • [35] Research on cloud-based traffic adaptive command and control method for mobile botnet
    Chen, Wei
    Zhou, Shi-Wen
    Yin, Cheng-Yu
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 32 - 38
  • [36] DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis
    Bilge, Leyla
    Balzarotti, Davide
    Robertson, William
    Kirda, Engin
    Kruegel, Christopher
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 129 - 138
  • [37] Honeynet Based Botnet Detection Using Command Signatures
    Bhatia, J. S.
    Sehgal, R. K.
    Kumar, Sanjeev
    ADVANCES IN WIRELESS, MOBILE NETWORKS AND APPLICATIONS, 2011, 154 : 69 - 78
  • [38] Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels
    Sood, Aditya K.
    Zeadally, Sherali
    Bansal, Rohit
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 22 - 28
  • [39] COMMAND AND CONTROL
    不详
    SCIENCE AND TECHNOLOGY, 1968, (82): : 40 - &
  • [40] Command and Control
    Trask, Peter M.
    Case, Frederic T.
    Forsythe, Steven L.
    McNamara, Thomas M., Jr.
    North, Paul D.
    Richeson, Kim E.
    Salamacha, Christine O.
    Tamer, John J.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2010, 29 (02): : 171 - 185