Skip to main content

2017 | OriginalPaper | Buchkapitel

Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing

verfasst von : Marios Anagnostopoulos, Georgios Kambourakis, Panagiotis Drakatos, Michail Karavolos, Sarantis Kotsilitis, David K. Y. Yau

Erschienen in: Web Information Systems Engineering – WISE 2017

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Botnet armies constitute a major and continuous threat to the Internet. Their number, diversity, and power grows with each passing day, and the last years we are witnessing their rapid expansion to mobile and even IoT devices. The work at hand focuses on botnets which comprise mobile devices (e.g. smartphones), and aims to raise the alarm on a couple of advanced Command and Control (C&C) architectures that capitalize on Tor’s hidden services (HS) and DNS protocol. Via the use of such architectures, the goal of the perpetrator is dual; first to further obfuscate their identity and minimize the botnet’s forensic signal, and second to augment the resilience of their army. The novelty of the introduced architectures is that it does not rely on static C&C servers, but on rotating ones, which can be reached by other botnet members through their (varied) onion address. Also, we propose a scheme called “Tor fluxing”, which opposite to legacy IP or DNS fluxing, does not rely on A type of DNS resource records but on TXT ones. We demonstrate the soundness and effectiveness of the introduced C&C constructions via a proof-of-concept implementation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Anagnostopoulos, M., Kambourakis, G., Gritzalis, S.: New facets of mobile botnet: architecture and evaluation. IJIS 15(5), 455–473 (2016)CrossRef Anagnostopoulos, M., Kambourakis, G., Gritzalis, S.: New facets of mobile botnet: architecture and evaluation. IJIS 15(5), 455–473 (2016)CrossRef
2.
Zurück zum Zitat Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., Gritzalis, S.: DNS amplification attack revisited. COSE 39(B), 475–485 (2013) Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., Gritzalis, S.: DNS amplification attack revisited. COSE 39(B), 475–485 (2013)
3.
Zurück zum Zitat Brown, D.: Resilient Botnet command and control with Tor. In: DEFCON 18 (2010) Brown, D.: Resilient Botnet command and control with Tor. In: DEFCON 18 (2010)
4.
Zurück zum Zitat Casenove, M., Miraglia, A.: Botnet over Tor: the illusion of hiding. In: 6th International Conference On CyCon 2014, pp. 273–282, June 2014 Casenove, M., Miraglia, A.: Botnet over Tor: the illusion of hiding. In: 6th International Conference On CyCon 2014, pp. 273–282, June 2014
5.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004) Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
7.
Zurück zum Zitat Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and detecting fast-flux service networks. In: NDSS 2008 (2008) Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and detecting fast-flux service networks. In: NDSS 2008 (2008)
8.
Zurück zum Zitat Kang, L.: Efficient Botnet herding within the Tor network. J. Comput. Virol. Hack. Tech. 11(1), 19–26 (2015)CrossRef Kang, L.: Efficient Botnet herding within the Tor network. J. Comput. Virol. Hack. Tech. 11(1), 19–26 (2015)CrossRef
10.
Zurück zum Zitat Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and Other Botnets. IEEE Comput. 50(7), 80–84 (2017)CrossRef Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and Other Botnets. IEEE Comput. 50(7), 80–84 (2017)CrossRef
11.
Zurück zum Zitat Lipovsky, R.: ESET Analyzes Simplocker: First Android File-Encrypting, TOR-enabled Ransomware, June 2014 Lipovsky, R.: ESET Analyzes Simplocker: First Android File-Encrypting, TOR-enabled Ransomware, June 2014
12.
Zurück zum Zitat Sanatinia, A., Noubir, G.: OnionBots: subverting privacy infrastructure for cyber attacks. In: 45th IEEE/IFIP International Conference on DSN, pp. 69–80, June 2015 Sanatinia, A., Noubir, G.: OnionBots: subverting privacy infrastructure for cyber attacks. In: 45th IEEE/IFIP International Conference on DSN, pp. 69–80, June 2015
13.
Zurück zum Zitat Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)CrossRef
15.
Zurück zum Zitat Tsiatsikas, Z., Anagnostopoulos, M., Kambourakis, G., Lambrou, S., Geneiatakis, D.: Hidden in plain sight. SDP-based covert channel for Botnet communication. In: Fischer-Hübner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 48–59. Springer, Cham (2015). doi:10.1007/978-3-319-22906-5_4CrossRef Tsiatsikas, Z., Anagnostopoulos, M., Kambourakis, G., Lambrou, S., Geneiatakis, D.: Hidden in plain sight. SDP-based covert channel for Botnet communication. In: Fischer-Hübner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 48–59. Springer, Cham (2015). doi:10.​1007/​978-3-319-22906-5_​4CrossRef
17.
Zurück zum Zitat Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th ACM SIGCOMM IMC 2010, New York, NY, USA, pp. 48–61, November 2010 Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th ACM SIGCOMM IMC 2010, New York, NY, USA, pp. 48–61, November 2010
Metadaten
Titel
Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing
verfasst von
Marios Anagnostopoulos
Georgios Kambourakis
Panagiotis Drakatos
Michail Karavolos
Sarantis Kotsilitis
David K. Y. Yau
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68786-5_41

Premium Partner