2017
DOI: 10.1007/978-3-319-68786-5_41
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
See 1 more Smart Citation
“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
“…Another article, claiming that because of Tor's unique features, HS can be used to control botnets [66], tests the implementation of new proxy-based botnet architectures that benefit from the anonymity provided by the Tor network to disguise its Command and Control infrastructure. To do this, each bot creates a Tor HS, thus acquiring an .onion address, to allow communication with the rest of the botnet.…”
Section: Performance and Deficienciesmentioning
confidence: 99%
“…[112] and Ref. [113] give a comprehensive review of mobile botnets; covering the state-of-the-art C&C architectures that are featured by contemporary mobile botnets. Anagnostopoulos et al [113] further elucidates the advanced capabilities that Tor's hidden services and DNS protocols avails to hackers for masking their identities and footprints, while also upscaling the resilience of their bot army through optimisations to a TXT-based Tor fluxing scheme for DNS operations.…”
Section: Botnets In Mobile and Cloud Environmentsmentioning
confidence: 99%
“…[113] give a comprehensive review of mobile botnets; covering the state-of-the-art C&C architectures that are featured by contemporary mobile botnets. Anagnostopoulos et al [113] further elucidates the advanced capabilities that Tor's hidden services and DNS protocols avails to hackers for masking their identities and footprints, while also upscaling the resilience of their bot army through optimisations to a TXT-based Tor fluxing scheme for DNS operations. In addition, sources such as Conti et al [114], Kadir et al [115], Farina et al [116], Alzahrani et al [117], Natarajan et al [118], Liao and Li (2014) [119], Eslahi et al [120], Mtibaa et al [121], Abdullah et al [122], Hamon (2014) [123], Mtibaa (2013) [124], Choi et al [125] and Apvrille et al [126] highlight some of the recent techniques and procedures used by attackers in setting up mobile botnets, as well as some countermeasures that have been recently developed for combating the challenge of mobile botnets.…”
Section: Botnets In Mobile and Cloud Environmentsmentioning
confidence: 99%
“…These armies of bots are used for launching Distributed Denial of Service (DDoS) attacks, sending spam emails on a massive scale, identity theft, and so forth [11]. To coordinate their network of bots effectively and in a stealthy manner, the botherders rely on advanced Command and Control (C&C) channels [12]. Specifically, the infected devices, called bots, receive and execute the commands of the botherder, through this covert C&C channel.…”
Section: Dns-based Candcmentioning
confidence: 99%