Cyber espionage through Botnets

被引:15
作者
Bederna, Zsolt [1 ]
Szadeczky, Tamas [2 ,3 ]
机构
[1] Obuda Univ, Doctoral Sch Safety & Secur Sci, Budapest, Hungary
[2] Natl Univ Publ Serv, Cybersecur Res Inst, Budapest, Hungary
[3] Masaryk Univ, Inst Law & Technol, Fac Law, Brno, Czech Republic
关键词
Botnet; Network science; Cyber espionage; APT28; VPNFilter;
D O I
10.1057/s41284-019-00194-6
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet usage for cyber espionage. We present the Botnet architecture in the context of network science research, lifecycle, applied network protocols, and capabilities. Next, we analyze two examples, the APT28 group activities and the VPNFilter Botnet, which demonstrate the real-life cyber espionage capability of this technique.
引用
收藏
页码:43 / 62
页数:20
相关论文
共 40 条
[1]   Survey of approaches and features for the identification of HTTP-based botnet traffic [J].
Acarali, Dilara ;
Rajarajan, Muttukrishnan ;
Komninos, Nikos ;
Herwono, Ian .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 :1-15
[2]  
Anomali, 2019, APT28 TIM MAL ACT
[3]  
[Anonymous], 2018, Trend Micro
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], 2019, ENISA Threat Landscape Report 2018
[6]  
Barabási AL, 2001, PHYS WORLD, V14, P33
[7]  
Barabasi Albert Laszlo es Eric Bonabea, 2003, B ALBERT LASZLO ERIC
[8]   Design and analysis of a social botnet [J].
Boshmaf, Yazan ;
Muslukhov, Ildar ;
Beznosov, Konstantin ;
Ripeanu, Matei .
COMPUTER NETWORKS, 2013, 57 (02) :556-578
[9]  
Canton D., 2015, Botnet detection through DNS-based approaches
[10]   CloudBot: Advanced mobile botnets using ubiquitous cloud technologies [J].
Chen, Wei ;
Luo, Xiapu ;
Yin, Chengyu ;
Xiao, Bin ;
Au, Man Ho ;
Tang, Yajuan .
PERVASIVE AND MOBILE COMPUTING, 2017, 41 :270-285