TY - GEN
T1 - Stegobot
T2 - 13th International Conference on Information Hiding, IH 2011
AU - Nagaraja, Shishir
AU - Houmansadr, Amir
AU - Piyawongwisal, Pratch
AU - Singh, Vijit
AU - Agarwal, Pragya
AU - Borisov, Nikita
PY - 2011
Y1 - 2011
N2 - We propose Stegobot, a new generation botnet that communicates over probabilistically unobservable communication channels. It is designed to spread via social malware attacks and steal information from its victims. Unlike conventional botnets, Stegobot traffic does not introduce new communication endpoints between bots. Instead, it is based on a model of covert communication over a social-network overlay - bot to botmaster communication takes place along the edges of a social network. Further, bots use image steganography to hide the presence of communication within image sharing behavior of user interaction. We show that it is possible to design such a botnet even with a less than optimal routing mechanism such as restricted flooding. We analyzed a real-world dataset of image sharing between members of an online social network. Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful - capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.
AB - We propose Stegobot, a new generation botnet that communicates over probabilistically unobservable communication channels. It is designed to spread via social malware attacks and steal information from its victims. Unlike conventional botnets, Stegobot traffic does not introduce new communication endpoints between bots. Instead, it is based on a model of covert communication over a social-network overlay - bot to botmaster communication takes place along the edges of a social network. Further, bots use image steganography to hide the presence of communication within image sharing behavior of user interaction. We show that it is possible to design such a botnet even with a less than optimal routing mechanism such as restricted flooding. We analyzed a real-world dataset of image sharing between members of an online social network. Analysis of Stegobot's network throughput indicates that stealthy as it is, it is also functionally powerful - capable of channeling fair quantities of sensitive data from its victims to the botmaster at tens of megabytes every month.
UR - http://www.scopus.com/inward/record.url?scp=80052986561&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052986561&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24178-9_21
DO - 10.1007/978-3-642-24178-9_21
M3 - Conference contribution
AN - SCOPUS:80052986561
SN - 9783642241772
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 299
EP - 313
BT - Information Hiding - 13th International Conference, IH 2011, Revised Selected Papers
Y2 - 18 May 2011 through 20 May 2011
ER -