The chapter discusses the most recent and sophisticated form of steganography and information hiding that can be used to empower botnets. Specifically, it investigates techniques proposed by the academic literature and observed in the wild in real malware. Since steganography and information hiding can be also used to avoid the detection of the software implementing the botnet, to implement some anti-forensics techniques, or to exploit local communications to bypass the sandboxes deployed within a host, the chapter will also review and classify the most promising mechanisms that could be used to engineer sophisticated, future botnets. With such a background, the chapter will also introduce possible detection techniques as well as network architectures properly suited to counteract risks arising from botnets.

Advanced Information Hiding Techniques for Modern Botnets

Luca Caviglione;
2019

Abstract

The chapter discusses the most recent and sophisticated form of steganography and information hiding that can be used to empower botnets. Specifically, it investigates techniques proposed by the academic literature and observed in the wild in real malware. Since steganography and information hiding can be also used to avoid the detection of the software implementing the botnet, to implement some anti-forensics techniques, or to exploit local communications to bypass the sandboxes deployed within a host, the chapter will also review and classify the most promising mechanisms that could be used to engineer sophisticated, future botnets. With such a background, the chapter will also introduce possible detection techniques as well as network architectures properly suited to counteract risks arising from botnets.
2019
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
Inglese
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
Botnets: Architectures, Countermeasures, and Challenges
165
188
9780367191542
CRC Press - Taylor & Francis Group
London
REGNO UNITO DI GRAN BRETAGNA
Sì, ma tipo non specificato
information hiding
steganography
cybersecurity
botnet
covert channel
1
02 Contributo in Volume::02.01 Contributo in volume (Capitolo o Saggio)
268
none
Luca Caviglione; Wojciech Mazurczyk; Steffen Wendzel
info:eu-repo/semantics/bookPart
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/346032
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact