Whispering Botnet Command and Control Instructions

被引:0
|
作者
Baden, Mathis [1 ]
Torres, Christof Ferreira [1 ]
Pontiveros, Beltran Borja Fiz [1 ]
State, Radu [1 ]
机构
[1] Univ Luxembourg, SnT, 29 Ave John F Kennedy, L-1855 Luxembourg, Luxembourg
来源
2019 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT 2019) | 2019年
关键词
blockchain; botnet; whisper; C&C;
D O I
10.1109/CVCBT.2019.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are responsible for many large scale attacks happening on the Internet. Their weak point, which is usually targeted to take down a botnet, is the command and control infrastructure: the foundation for the diffusion of the botmaster's instructions. Hence, botmasters employ stealthy communication methods to remain hidden and retain control of the botnet. Recent research has shown that blockchains can be leveraged for under the radar communication with bots, however these methods incur fees for transaction broadcasting. This paper discusses the use of a novel technology, Whisper, for command and control instruction dissemination. Whisper allows a botmaster to control bots at virtually zero cost, while providing a peer-to-peer communication infrastructure, as well as privacy and encryption as part of its dark communication strategy. It is therefore well suited for bidirectional botnet command and control operations, and creating a botnet that is very difficult to take down.
引用
收藏
页码:77 / 81
页数:5
相关论文
共 24 条
  • [11] Real-Time Botnet Command and Control Characterization at the Host Level
    Etemad, Farhood Farid
    Vahdani, Payam
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1005 - 1009
  • [12] C&C Tracer: Botnet Command and Control Behavior Tracing
    Tsai, Meng-Han
    Chang, Kai-Chi
    Lin, Chang-Cheng
    Mao, Ching-Hao
    Lee, Huey-Ming
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 1859 - 1864
  • [13] A Framework for Detecting Botnet Command and Control Communication over an Encrypted Channel
    Ismail, Zahian
    Jantan, Aman
    Yusoff, Mohd Najwadi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 319 - 326
  • [14] BotDet: A System for Real Time Botnet Command and Control Traffic Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Baker, Thar
    Jabbar, Sohail
    Khalid, Shehzad
    Jaf, Sardar
    IEEE ACCESS, 2018, 6 : 38947 - 38958
  • [15] Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
    Kartaltepe, Erhan J.
    Morales, Jose Andre
    Xu, Shouhuai
    Sandhu, Ravi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 511 - +
  • [16] Mining Malware Command and Control Traces
    McLaren, Peter
    Russell, Gordon
    Buchanan, Bill
    2017 COMPUTING CONFERENCE, 2017, : 788 - 794
  • [17] Industrial Control System Security-Malware Botnet Detection
    Sagala, Albert
    Pardosi, Rudy
    Lumbantobing, Alexander
    Siagian, Pandapotab
    2016 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS, AND ITS APPLICATIONS (IC3INA) - RECENT PROGRESS IN COMPUTER, CONTROL, AND INFORMATICS FOR DATA SCIENCE, 2016, : 125 - 130
  • [18] Blockchain based method of dynamic command and control
    Pan Y.
    Wei W.
    Liu Y.
    Zhu C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (09): : 2817 - 2825
  • [19] Using Distributed Ledgers For Command and Control - Concepts and Challenges
    Last, David
    Atighetchi, Michael
    Pal, Partha
    Toner, Ryan
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [20] Analysis of Attacker Behavior in Compromised Hosts During Command and Control
    Sadique, Farhan
    Sengupta, Shamik
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,