Affiliation:
1. School of Computer Science and Informatics, Cardiff University, Cardiff CF24 4AG, UK
Abstract
The widespread adoption of cloud-based and public legitimate services (CPLS) has inadvertently opened up new avenues for cyber attackers to establish covert and resilient command-and-control (C&C) communication channels. This abuse poses a significant cybersecurity threat, as it allows malicious traffic to blend seamlessly with legitimate network activities. Traditional detection systems are proving inadequate in accurately identifying such abuses, emphasizing the urgent need for more advanced detection techniques. In our study, we conducted an extensive systematic literature review (SLR) encompassing the academic and industrial literature from 2008 to July 2023. Our review provides a comprehensive categorization of the attack techniques employed in CPLS abuses and offers a detailed overview of the currently developed detection strategies. Our findings indicate a substantial increase in cloud-based abuses, facilitated by various attack techniques. Despite this alarming trend, the focus on developing detection strategies remains limited, with only 7 out of 91 studies addressing this concern. Our research serves as a comprehensive review of CPLS abuse for the C&C infrastructure. By examining the emerging techniques used in these attacks, we aim to make a significant contribution to the development of effective botnet defense strategies.
Funder
Jubail Industrial College
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference123 articles.
1. Peer-to-Peer Botnets: Overview and Case Study;Grizzard;HotBots,2007
2. Abu Rajab, M., Zarfoss, J., Monrose, F., and Terzis, A. (2006, January 25–27). A multifaceted approach to understanding the botnet phenomenon. Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, Rio de Janeiro, Brazil.
3. Malware Command and Control Over Social Media: Towards the Server-less Infrastructure;Serbian J. Electr. Eng.,2020
4. Detection of malicious social bots: A survey and a refined taxonomy;Latah;Expert Syst. Appl.,2020
5. Botnets: A survey;Silva;Comput. Netw.,2013
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Using DNS Patterns for Automated Cyber Threat Attribution;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Generative AI in Network Security and Intrusion Detection;Advances in Information Security, Privacy, and Ethics;2024-07-26
3. Study and Verification of Covert Channels for Process Layer Network in Smart Substations;2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2);2023-12-15
4. Multimodel Collaboration to Combat Malicious Domain Fluxing;Electronics;2023-10-02