Journal on Communications ›› 2014, Vol. 35 ›› Issue (1): 156-166.doi: 10.3969/j.issn.1000-436x.2014.01.018

• Academic communication • Previous Articles     Next Articles

Using coverage analysis to extract Botnet command-and-control protocol

Zhi WANG,Ya-yun CAI,Lu LIU,Chun-fu JIA   

  1. College of Computer and Control Engineering,Nankai University,Tianjin 300071,China
  • Online:2014-01-25 Published:2017-06-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Fundamental Research Funds for the Central Universities;Nankai University-Tencent Joint Project

Abstract:

There are some inherent patterns in the bot execution trace coverage of basic blocks.Using these patterns,an approach was proposed to infer Botnet command-and-control protocol (C&C protocol).Without intermediate representation of binary code and constraints solving,this approach has a lower time and space overhead.This coverage analysis approach was evaluated on 3 famous Botnet:Zeus,Sdbot and Agobot.The result shows that this approach can accurately and efficiently extract the Botnet control commands.And the completeness of the extracted control commands could be verified by checking whether all available basic blocks in bot are covered by the traces triggered by the control commands.

Key words: malware analysis, Botnet, command-and-control protocol, code block, code coverage

No Suggested Reading articles found!