Whispering Botnet Command and Control Instructions

被引:0
|
作者
Baden, Mathis [1 ]
Torres, Christof Ferreira [1 ]
Pontiveros, Beltran Borja Fiz [1 ]
State, Radu [1 ]
机构
[1] Univ Luxembourg, SnT, 29 Ave John F Kennedy, L-1855 Luxembourg, Luxembourg
来源
2019 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT 2019) | 2019年
关键词
blockchain; botnet; whisper; C&C;
D O I
10.1109/CVCBT.2019.00009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are responsible for many large scale attacks happening on the Internet. Their weak point, which is usually targeted to take down a botnet, is the command and control infrastructure: the foundation for the diffusion of the botmaster's instructions. Hence, botmasters employ stealthy communication methods to remain hidden and retain control of the botnet. Recent research has shown that blockchains can be leveraged for under the radar communication with bots, however these methods incur fees for transaction broadcasting. This paper discusses the use of a novel technology, Whisper, for command and control instruction dissemination. Whisper allows a botmaster to control bots at virtually zero cost, while providing a peer-to-peer communication infrastructure, as well as privacy and encryption as part of its dark communication strategy. It is therefore well suited for bidirectional botnet command and control operations, and creating a botnet that is very difficult to take down.
引用
收藏
页码:77 / 81
页数:5
相关论文
共 24 条
  • [21] A Novel Ensemble Anomaly based Approach for Command and Control Channel Detection
    Chen, Tao
    Zhou, Guangming
    Liu, Zhangpu
    Jing, Tao
    2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 74 - 78
  • [22] Web-based botnet for blocking control flow in open-source medical syringe pump
    Lu, Wei
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2025, 16 (02) : 162 - 172
  • [23] Scalable Command and Control Detection in Log Data through UF-ICF Analysis
    Hong, Kai-Fong
    Chen, Chien-Chih
    Chiu, Yu-Ting
    Chou, Kuo-Sen
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 293 - 298
  • [24] Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT
    Spaulding, Jeffrey
    Park, Jeman
    Kim, Joongheon
    Nyang, DaeHun
    Mohaisen, Aziz
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (04)