Affiliation:
1. DiploFoundation, Beograd, Serbia
2. Singidunum University, Beograd, Serbia
Abstract
Intrusions into the computer systems are becoming increasingly sophisticated.
Command and Control (C2) infrastructure, which enables attackers to remotely
control infected devices, is a critical component. Malware is set to connect
to C2 servers to receive commands and payloads, or upload logs or stolen
files. Since techniques for detecting traditional C2 servers are also
advancing, attackers look for ways to make C2 communication stealth and
resilient. Increasingly, they hide C2 communications in plain sight, in
particular on social media and other cloud-based public services. In this
paper, we identify several emerging trends in the use of social media for C2
communications by providing a review of the existing research, discuss how
attackers could combine these trends in the future to create a stealth and
resilient server-less C2 model, look at possible defence aspects, and
suggest further research.
Publisher
National Library of Serbia
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Mechanical Engineering,Energy Engineering and Power Technology,Control and Systems Engineering
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献