首页> 外文期刊>Serbian Journal of Electrical Engineering >Malware command and control over social media: Towards the server-less infrastructure
【24h】

Malware command and control over social media: Towards the server-less infrastructure

机译:恶意软件命令和控制社交媒体:朝向更少的服务器基础架构

获取原文
           

摘要

Intrusions into the computer systems are becoming increasinglysophisticated. Command and Control (C2) infrastructure, which enables attackersto remotely control infected devices, is a critical component. Malware is set toconnect to C2 servers to receive commands and payloads, or upload logs orstolen files. Since techniques for detecting traditional C2 servers are alsoadvancing, attackers look for ways to make C2 communication stealth andresilient. Increasingly, they hide C2 communications in plain sight, in particularon social media and other cloud-based public services. In this paper, we identifyseveral emerging trends in the use of social media for C2 communications byproviding a review of the existing research, discuss how attackers could combinethese trends in the future to create a stealth and resilient server-less C2 model,look at possible defence aspects, and suggest further research.
机译:进入计算机系统的入侵正在变得越来越多地。命令和控制(C2)基础设施,使攻击赛程远程控制受感染的设备,是一个关键组件。恶意软件已将ToConnect设置为C2服务器以接收命令和有效负载,或上载日志Orstolen文件。由于检测传统C2服务器的技术也是add,因此攻击者寻找制作C2通信隐形AndResilient的方法。他们越来越多地隐藏在透明的视线中的C2通信,Indure社会媒体和其他基于云的公共服务。在本文中,我们识别在使用社交媒体中使用社交媒体的新兴趋势,通过提供对现有研究的审查,讨论攻击者如何结合未来的趋势,以创建隐形和弹性服务器更少的C2模型,看看可能的防御方面,并建议进一步研究。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号