Skip to main content

2015 | OriginalPaper | Buchkapitel

3. Identifying and Exploiting the Cyber High Ground for Botnets

verfasst von : Patrick Sweeney, George Cybenko

Erschienen in: Cyber Warfare

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

For over 2000 years, military strategists have recognized the importance of capturing and holding the physical “high ground.” As cyber warfare strategy and tactics mature, it is important to explore the counterpart of “high ground” in the cyber domain. To this end, we develop the concept for botnet operations. Botnets have gained a great deal of attention in recent years due to their use in criminal activities. The criminal goal is typically focused on stealing information, hijacking resources, or denying service from legitimate users. In such situations, the scale of the botnet is of key importance. Bigger is better. However, several recent botnets have been designed for industrial or national espionage. These attacks highlight the importance of where the bots are located, not only how many there are. Just as in kinetic warfare, there is a distinct advantage to identifying, controlling, and exploiting an appropriately defined high ground. For targeted denial of confidentiality, integrity, and availability attacks thecyber high ground can be defined and realized in a physical network topology. An attacker who controls this cyber high ground gains a superior capability to achieve his mission objectives. Our results show that such an attacker may reduce their botnet’s footprint and increase its dwell time by up to 87 % and 155× respectively over a random or ill-informed attacker.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat BAE Systems, 2014. Snake Campaign & Cyber Espionage Toolkit. Tech. rep. BAE Systems, 2014. Snake Campaign & Cyber Espionage Toolkit. Tech. rep.
Zurück zum Zitat Cooke, E., Jahanian, F., McPherson, D., 2005. The zombie roundup: Understanding, detecting, and disrupting botnets. Proceedings of the USENIX SRUTI Workshop. Cooke, E., Jahanian, F., McPherson, D., 2005. The zombie roundup: Understanding, detecting, and disrupting botnets. Proceedings of the USENIX SRUTI Workshop.
Zurück zum Zitat Dagon, D., Gu, G., Lee, C. P., Lee, W., Dec. 2007. A Taxonomy of Botnet Structures. Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 325–339. Dagon, D., Gu, G., Lee, C. P., Lee, W., Dec. 2007. A Taxonomy of Botnet Structures. Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 325–339.
Zurück zum Zitat R.M. Karp. 1972. Reducibility among combinatorial problems. R.E. Miller, J.W. Thatcher (Eds.), Complexity of Computer Computations, Plenum Press, New York, pp. 85–104. R.M. Karp. 1972. Reducibility among combinatorial problems. R.E. Miller, J.W. Thatcher (Eds.), Complexity of Computer Computations, Plenum Press, New York, pp. 85–104.
Zurück zum Zitat Krekel, B., Adams, P., Bakos, G., 2012. Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. Krekel, B., Adams, P., Bakos, G., 2012. Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage.
Zurück zum Zitat Lee, W., Wang, C., Dagon, D., 2010. Botnet Detection: Countering the Largest Security Threat. Lee, W., Wang, C., Dagon, D., 2010. Botnet Detection: Countering the Largest Security Threat.
Zurück zum Zitat Mcwhorter, D., 2013. APT1: Exposing One of China’s Cyber Espionage Units. Mandiant. com. URL Mcwhorter, D., 2013. APT1: Exposing One of China’s Cyber Espionage Units. Mandiant. com. URL
Zurück zum Zitat Spring, N., Mahajan, R., Wetherall, D., Anderson, T., Feb. 2004. Measuring ISP Topologies With Rocketfuel. IEEE/ACM Transactions on Networking 12 (1), 2–16. Spring, N., Mahajan, R., Wetherall, D., Anderson, T., Feb. 2004. Measuring ISP Topologies With Rocketfuel. IEEE/ACM Transactions on Networking 12 (1), 2–16.
Zurück zum Zitat Sweeney, P. J., 2014. Designing effective and stealthy botnets for cyber espionage and interdiction: Finding the cyber high ground. Ph.D. Thesis, Thayer School of Engineering, Dartmouth College, Hanover NH. Sweeney, P. J., 2014. Designing effective and stealthy botnets for cyber espionage and interdiction: Finding the cyber high ground. Ph.D. Thesis, Thayer School of Engineering, Dartmouth College, Hanover NH.
Zurück zum Zitat Tzu, S., 2013. The art of war. Orange Publishing. Tzu, S., 2013. The art of war. Orange Publishing.
Zurück zum Zitat Wang, P., Aslam, B., Zou, C., 2010. Peer-to-Peer Botnets: The Next Generation of Botnet Attacks. Electrical Engineering, 1–25. Wang, P., Aslam, B., Zou, C., 2010. Peer-to-Peer Botnets: The Next Generation of Botnet Attacks. Electrical Engineering, 1–25.
Metadaten
Titel
Identifying and Exploiting the Cyber High Ground for Botnets
verfasst von
Patrick Sweeney
George Cybenko
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-14039-1_3