Abstract
In this paper, we provide the initial steps towards a botnet deception mechanism, which we call 2face. 2face provides deception capabilities in both directions - upward, to the command and control (CnC) server, and downward, towards the botnet nodes - to provide administrators with the tools they need to discover and eradicate an infestation within their network without alerting the botnet owner that they have been discovered. The key to 2face is a set of mechanisms for rapidly reverse engineering the protocols used within a botnet. The resulting protocol descriptions can then be used with the 2face network deception tool to generate high-quality deceptive messaging, against the attacker. As context for our work, we show how 2face can be used to help reverse engineer and then generate deceptive traffic for the Mirai protocol. We also discuss how this work could be extended to address future threats.
Cite
CITATION STYLE
Chandler, J., Fisher, K., Chapman, E., Davis, E., & Wick, A. (2020). Invasion of the Botnet snatchers: A case study in applied malware cyberdeception. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2020-January, pp. 1855–1864). IEEE Computer Society. https://doi.org/10.24251/hicss.2020.229
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.