The command & control (c&c) protocols of botnets are moving away from plaintext IRC communicationt towards encrypted and obfuscated protocols. In general, these protocols are proprietary. Therefore, standard network monitoring tools are not able to extract the commands from the collected traffic. However, if we want to monitor these new botnets, we need to know how their protocol decryption works. In this paper we present a novel approach in malware analysis for locating the encryption and decryption functions in botnet programs. This information can be used to extract these functions for c&c protocols. We illustrate the applicability of our approach by a sample from the Kraken botnet. Using our approach, we were able to identify the encryption routine within minutes. We then extracted the c&c protocol encryption and decryption. Both are presented in this paper. © IFIP International Federation for Information Processing 2009.
CITATION STYLE
Leder, F. S., & Martini, P. (2009). NGBPA next generation botnet protocol analysis. In IFIP Advances in Information and Communication Technology (Vol. 297, pp. 307–317). Springer New York LLC. https://doi.org/10.1007/978-3-642-01244-0_27
Mendeley helps you to discover research relevant for your work.