Browse > Article
http://dx.doi.org/10.7472/jksii.2022.23.5.103

An Encrypted Botnet C&C Communication Method in Bitcoin Network  

Kim, Kibeom (Department of Defense Science(Computer Engineering Major), Graduate School of Defense Management, Korea National Defense University)
Cho, Youngho (Department of Defense Science(Computer Engineering Major), Graduate School of Defense Management, Korea National Defense University)
Publication Information
Journal of Internet Computing and Services / v.23, no.5, 2022 , pp. 103-110 More about this Journal
Abstract
Botnets have been exploited for a variety of purposes, ranging from monetary demands to national threats, and are one of the most threatening types of attacks in the field of cybersecurity. Botnets emerged as a centralized structure in the early days and then evolved to a P2P structure. Bitcoin is the first online cryptocurrency based on blockchain technology announced by Satoshi Nakamoto in 2008 and is the most widely used cryptocurrency in the world. As the number of Bitcoin users increases, the size of Bitcoin network is also expanding. As a result, a botnet using the Bitcoin network as a C&C channel has emerged, and related research has been recently reported. In this study, we propose an encrypted botnet C&C communication mechanism and technique in the Bitcoin network and validate the proposed method by conducting performance evaluation through various experiments after building it on the Bitcoin testnet. By this research, we want to inform the possibility of botnet threats in the Bitcoin network to researchers.
Keywords
Bitcoin Network; Botnet C&C Communication; Encryption; Cyber Threat;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, Ronaldo M. Salles, "Botnets: A survey", Computer Networks, Vol. 57, No. 2, pp. 378-403, 2013. https://doi.org/10.1016/j.comnet.2012.07.021   DOI
2 L. Bock, N. Alexopoulos, E. Saracoglu, M. Muhlhauser and E. Vasilomanolakis, "Assessing the Threat of Blockchain-based Botnets", 2019 APWG Symposium on Electronic Crime Research (eCrime), pp. 1-11, 2019. https://doi.org/10.1109/eCrime47957.2019.9037600   DOI
3 Ali, S.T., McCorry, P., Lee, P.HJ. et al., "ZombieCoin 2.0: managing next-generation botnets using Bitcoin" International Journal of Information Security, Vol. 17, No. 4, pp. 411-422, 2018. https://doi.org/10.1007/s10207-017-0379-8   DOI
4 Nakamoto Satoshi, "Bitcoin: A peer-to-peer electronic cash system", Decentralized Business Review, 2008.
5 Korea 4th Industrial Revolution Committee Resolution, "「Blockchain Technology Expansion Strategy」 for a hyper-connected and non-face-to-face trust society", 2020. https://www.4th-ir.go.kr/article/detail/1142
6 M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir "A Survey of Botnet Technology and Defenses", 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp. 299-304, 2009. https://doi.org/10.1109/CATCH.2009.40   DOI
7 B.H, Kang, et al., "Towards complete node enumeration in a peerto-peer botnet", Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 23-34, 2009. https://doi.org/10.1145/1533057.1533064   DOI
8 Jaewoo Jeon, and Youngho Cho, "Construction and Performance Analysis of Image Steganography-Based Botnet in KakaoTalk Openchat", Computers, 8(3), 61, 2019. https://doi.org/10.3390/computers8030061   DOI
9 https://bitnodes.io/
10 Bartoletti, M. and Pompianu, L., "An Analysis of Bitcoin OP_RETURN Metadata", International Conference on Financial Cryptography and Data Security, pp. 218-230, 2017. https://doi.org/10.1007/978-3-319-70278-0_14   DOI
11 https://bitinfocharts.com/comparison/bitcointransactionfees.html
12 S. Chang, L. Zhang, Y. Guan and T. E. Daniels, "A Framework for P2P Botnets", 2009 WRI International Conference on Communications and Mobile Computing, pp. 594-599, 2009. https://doi.org/10.1109/CMC.2009.268   DOI
13 Kwak, Minkyung, and Youngho Cho, "A novel video steganography-based botnet communication model in telegram sns messenger", Symmetry, 13(1), 84, 2021. https://doi.org/10.3390/sym13010084   DOI
14 G. Vormayr, T. Zseby and J. Fabini, "Botnet Communication Patterns", IEEE Communications Surveys & Tutorials, Vol. 19, No. 4, pp. 2768-2796, 2017. http://dx.doi.org/10.1109/COMST.2017.2749442   DOI
15 V. Vallois and F. A. Guenane, "Bitcoin transaction: From the creation to validation, a protocol overview, 2017 1st Cyber Security in Networking Conference (CSNet), pp. 378-403, 2017. https://doi.org/10.1109/CSNET.2017.8241988   DOI
16 Franzoni, F., Abellan, I., Daza, V, "Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems", International Conference on Financial Cryptography and Data Security, pp. 3-19, 2020. https://doi.org/10.1007/978-3-030-51280-4_1   DOI