2015 IEEE Conference on Communications and Network Security (CNS) 2015
DOI: 10.1109/cns.2015.7346813
|View full text |Cite
|
Sign up to set email alerts
|

Boten ELISA: A novel approach for botnet C&C in Online Social Networks

Abstract: The Command and Control (C&C) channel of modern botnets is migrating from traditional centralized solutions (such as the ones based on Internet Relay Chat and Hyper Text Transfer Protocol), towards new decentralized approaches. As an example, in order to conceal their traffic and avoid blacklisting mechanisms, recent C&C channels use peer-to-peer networks or abuse popular Online Social Networks (OSNs). A key reason for this paradigm shift is that current detection systems become quite effective in detecting ce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
4

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 34 publications
0
9
0
4
Order By: Relevance
“…While the appearance of a certain uncommon character set in public SM posts cannot be a single factor in identifying such SM C2 communications, it may be one of the factors to take into account. Compagno et al [30] have devised yet a different model. In their peer-topeer botnet model called ELISA, the bot hides its exchange with a C2 server within the legitimate Facebook post of the ignorant owner of a bot: it attaches a set of non-printing characters, marking the start of the sequence by an invisible separator U+2063.…”
Section: Hiding C2 Commands In Text-based Sm Postsmentioning
confidence: 99%
“…While the appearance of a certain uncommon character set in public SM posts cannot be a single factor in identifying such SM C2 communications, it may be one of the factors to take into account. Compagno et al [30] have devised yet a different model. In their peer-topeer botnet model called ELISA, the bot hides its exchange with a C2 server within the legitimate Facebook post of the ignorant owner of a bot: it attaches a set of non-printing characters, marking the start of the sequence by an invisible separator U+2063.…”
Section: Hiding C2 Commands In Text-based Sm Postsmentioning
confidence: 99%
“…Especially, as the popularity of SNS (Social Network Service) and smartphones increase, researchers studied on SNS-based stegobotnets which are constructed in popular SNS platforms such as Facebook and Twitter [11,13]. The SNS-based stegobotnet has a couple of advantages over existing botnets.…”
Section: A Novel Stealthy Botnet: Steganography-based Botnet (Stegobomentioning
confidence: 99%
“…Compagno et al [11] proposed a steganography-based botnet in Facebook and Google Plus. They used Unicode steganography technique in web pages.…”
Section: Existing Studies On Stegobotnetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Uma social botnet (SbN)é gerenciada através do seu controlador, também denominado formalmente como um botmaster, representado como um indivíduo sistema mal-intencionado com acesso a uma mais contas da OSN, sendo esse o modo pelo qual interage com a rede social. As atividades que um controlador executa através de uma social botnet são delimitadas pelo conjunto de ações que o OSN disponibiliza para qualquer usuário verdadeiro [Compagno et al 2015].…”
Section: Social Botnet (Sbn)unclassified