Assessing the Threat of Blockchain-based Botnets

Leon Böck, Nikolaos Alexopoulos, Emine Saracoglu, Max Mühlhäuser, Emmanouil Vasilomanolakis

Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

14 Citationer (Scopus)

Abstract

Time and time again the security community has faced novel threats that were previously never analyzed, sometimes with catastrophic results. To avoid this, proactive analysis of envisioned threats is of great importance. One such threat is blockchain-based botnets. Bitcoin, and blockchain-based decentralized cryptocurrencies in general, promise a fair and more transparent financial system. They do so by implementing an open and censorship-resistant atomic broadcast protocol that enables the maintenance of a global transaction ledger, known as a blockchain. In this paper, we consider how this broadcast protocol may be used for malicious behavior as a botnet command and control (C2) channel. Botmasters have been known to misuse broadcasting platforms, like social media, as C2 channels. However, these platforms lack the integral censorship-resistant property of decentralized cryptocurrencies. In this paper, we provide a comprehensive systematization of knowledge study on using blockchains as botnet C2 channels, generating a number of important insights. We set off by providing a critical analysis of the state of the art of blockchain-based botnets, along with an abstract model of such a system. We then examine the inherent limitations of the design, in an attempt to challenge the feasibility of such a botnet. With such limitations in mind, we move forward with an experimental analysis of the detectability of such botnets and discuss potential countermeasures. Contrary to previous work that proposed such botnets, we provide a broad overview of the associated risk and view the problem in relation to other existing botnet C2 channels. We conclude that despite its limitations, the blockchain, as a backup mechanism, practically renders attempts to suppress the control channel of a botnet futile. Thus, more focus should be put on detecting and disinfecting machines at the network edge (router) or even per-bot level.

OriginalsprogEngelsk
Titel2019 APWG Symposium on Electronic Crime Research (eCrime)
Antal sider11
ForlagIEEE
Publikationsdato19 mar. 2020
Artikelnummer9037600
ISBN (Trykt)978-1-7281-6384-0
ISBN (Elektronisk)978-1-7281-6383-3
DOI
StatusUdgivet - 19 mar. 2020
Begivenhed2019 APWG Symposium on Electronic Crime Research (eCrime) - Pittsburgh, USA
Varighed: 13 nov. 201915 nov. 2019

Konference

Konference2019 APWG Symposium on Electronic Crime Research (eCrime)
Land/OmrådeUSA
ByPittsburgh
Periode13/11/201915/11/2019

Fingeraftryk

Dyk ned i forskningsemnerne om 'Assessing the Threat of Blockchain-based Botnets'. Sammen danner de et unikt fingeraftryk.

Citationsformater