Author:
Bederna Zsolt,Szadeczky Tamas
Abstract
Abstract
Botnets, the groups of illegally controlled infected devices on the Internet have had a history of two decades already. This history shows an evolution of the infection techniques, the scope of the target devices, and their usage. Thus, the new direction is the usage of sophisticated data leakage techniques by state-sponsored hacker groups. Our article analyses this evolution while focusing on Botnet usage for cyber espionage. We present the Botnet architecture in the context of network science research, lifecycle, applied network protocols, and capabilities. Next, we analyze two examples, the APT28 group activities and the VPNFilter Botnet, which demonstrate the real-life cyber espionage capability of this technique.
Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference41 articles.
1. Acarali, D., M. Rajarajan, N. Komninos, and I. Herwono. 2016. Survey of approaches and features for the identification of HTTP-based Botnet traffic. Journal of Network and Computer Applications 76: 1–15.
2. Akamai, 2015. XOR DDoS Botnet Launching 20 Attacks a Day From Compromised Linux Machines, Says Akamai.
https://www.akamai.com/us/en/about/news/press/2015-press/xor-ddos-botnet-attacking-linux-machines.jsp
. Accessed 15 July 2018.
3. Anomali, 2019. APT28 Timeline of Malicious Activity.
https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019
. Accessed 21 February 2019.
4. Barabási Albert László, 2001. The physics of the web. Physics World, pp. 33–38.
5. Barabási Albert László és Eric Bonabea, 2003.
http://barabasi.com/f/124.pdf
. Accessed 02 May 2013.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献