The chapter discusses the most recent and sophisticated form of steganography and information hiding that can be used to empower botnets. Specifically, it investigates techniques proposed by the academic literature and observed in the wild in real malware. Since steganography and information hiding can be also used to avoid the detection of the software implementing the botnet, to implement some anti-forensics techniques, or to exploit local communications to bypass the sandboxes deployed within a host, the chapter will also review and classify the most promising mechanisms that could be used to engineer sophisticated, future botnets. With such a background, the chapter will also introduce possible detection techniques as well as network architectures properly suited to counteract risks arising from botnets.

Advanced Information Hiding Techniques for Modern Botnets

Luca Caviglione;
2019

Abstract

The chapter discusses the most recent and sophisticated form of steganography and information hiding that can be used to empower botnets. Specifically, it investigates techniques proposed by the academic literature and observed in the wild in real malware. Since steganography and information hiding can be also used to avoid the detection of the software implementing the botnet, to implement some anti-forensics techniques, or to exploit local communications to bypass the sandboxes deployed within a host, the chapter will also review and classify the most promising mechanisms that could be used to engineer sophisticated, future botnets. With such a background, the chapter will also introduce possible detection techniques as well as network architectures properly suited to counteract risks arising from botnets.
2019
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
9780367191542
information hiding
steganography
cybersecurity
botnet
covert channel
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/346032
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact