27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ivan Burke and Renier van Heerden<br />

Flaws in Google Gadgets have been demonstrated by Barth et al. (2009). They noted that JavaScript<br />

can lead to exploitation. These vulnerabilities include session sharing vulnerabilities which enable<br />

Cross-Site Scripting (XSS) and malicious redirects to Man-in-the-middle attacks. Google has been<br />

reluctant to fix some of these vulnerabilities since 2004. (Robert 2008)<br />

In Section 2, we investigate the composition of a basic Botnet. In Section 3, we describe our attempt<br />

at mimicking these components. In Section 4, we discuss our Botnet model. In Section 5, we propose<br />

possible future application of this work. In Section 6, we discuss our conclusion and possible means<br />

of stopping these types of Botnets.<br />

2. Anatomy of a botnet<br />

Botnets tend to share communalities in their structure and design. In this Section, we describe the<br />

common components of a Botnet as well as their role within the Botnet.<br />

Figure 1: Anatomy of a Botnet<br />

2.1 Command and control component<br />

A large part of a Botnet’s success can be attributed to its ability to execute large, synchronized,<br />

distributed attacks. This would require sophisticated command and control (C2) structures to coordinate<br />

these attacks (Banks 2007, Ollmann, 2009).<br />

Communication channels usually relay herder instructions, such as commands to execute on remote<br />

PC. Bots use channels to send back retrieved data such as key logger information or command<br />

response information. These communications need to be covert in order to hide the Botnet activities.<br />

Over the years several covert channels have been used to communicate commands between Bot and<br />

Botherder such as Twitter, Internet Relay Chat (IRC) and Instant Messages. Several advance C2<br />

techniques such as steganography or social media sites to hide Botnet communication in plain sight.<br />

Next we look at the types of attacks that could be executed by Botnots (Ollmann, 2009)<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!