JACKSTRAWS: Picking Command and Control Connections from Bot Traffic

Download Now
Provided by: University of Calgary
Topic: Security
Format: PDF
A distinguishing characteristic of bots is their ability to establish a Command and Control (C&C) channel. The typical approach to build detection models for C&C traffic and to identify C&C endpoints (IP addresses and domains of C&C servers) is to execute a bot in a controlled environment and monitor its outgoing network connections. Using the bot traffic, one can then craft signatures that match C&C connections or blacklist the IP addresses or domains that the packets are sent to. Unfortunately, this process is not as easy as it seems.
Download Now

Find By Topic