Fluxing Botnet Command and Control Channels with URL Shortening Services
SCIE
SCOPUS
- Title
- Fluxing Botnet Command and Control Channels with URL Shortening Services
- Authors
- Sangho Lee; Kim, J
- Date Issued
- 2013-02-01
- Publisher
- ELSEVIER SCIENCE
- Abstract
- URL shortening services (USSes), which provide short aliases to registered long URLs, have become popular owing to Twitter. Despite their popularity, researchers do not carefully consider their security problems. in this paper, we explore botnet models based on USSes to prepare for new security threats before they evolve. Specifically, we consider using USSes for alias flux to hide botnet command and control (C&C) channels. In alias flux, a botmaster obfuscates the IP addresses of his C&C servers, encodes them as URLs, and then registers them to USSes with custom aliases generated by an alias generation algorithm. Later, each bot obtains the encoded IP addresses by contacting USSes using the same algorithm. For USSes that do not support custom aliases, the botmaster can use shared alias lists instead of the shared algorithm. DNS-based botnet detection schemes cannot detect an alias flux botnet, and network-level detection and blacklisting of the fluxed aliases are difficult. We also discuss possible countermeasures to cope with these new threats and investigate operating USSes. (C) 2012 Elsevier B.V. All rights reserved.
- Keywords
- Botnet; DNS; Domain flux; URL shortening service
- URI
- https://oasis.postech.ac.kr/handle/2014.oak/16138
- DOI
- 10.1016/j.comcom.2012.10.003
- ISSN
- 0140-3664
- Article Type
- Article
- Citation
- Computer Communications, vol. 36, no. 3, page. 320 - 332, 2013-02-01
- Files in This Item:
- There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.