scholarly journals Analysis and characterization of IoT malware command and control communication

2020 ◽  
Vol 12 (2) ◽  
pp. 80-85
Author(s):  
Đorđe Jovanović ◽  
Pavle Vuletić

The emergence of Mirai botnet in 2016 took worldwide research teams by surprise, proving that a large number of low-performance IoT devices could be hacked and used for illegal purposes, causing extremely voluminous DDoS attacks. Therefore, a thorough inspection of the current state of IoT botnets is essential. In this paper, we analyze the dynamic behavior and command and control channels of two classes of IoT botnets, Mirai and Gafgyt. Based on collected information, a comparative analysis and key phases of botnet communication is provided. Such an analysis will serve as a basis for smart botnet detection mechanisms.

Author(s):  
S.Nagendra Prabhu ◽  
D.Shanthi

Among the various forms of malware, Botnet is the serious threat which occurs commonly in today’s cyber attacks and cyber crimes. Botnet are designed to perform predefined functions in an automated fashion, where these malicious activities ranges from online searching of data, accessing lists, moving files sharing channel information to DDoS attacks against critical targets, phishing, click fraud etc. Existence of command and control(C&C) infrastructure makes the functioning of Botnet unique; in turn throws challenges in the mitigation of Botnet attacks. Hence Botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention in network security. Various types of techniques and approaches have been proposed for detection, mitigation and preventation to Botnet attack. Here I discusses in detail about Botnet and related research including Botnet evolution, life-cycle, command and control models, communication protocols, Botnet detection, and Botnet mitigation mechanism etc. Also an overview of research on Botnets which describe the possible attacks performed by various types of Botnet communication technologies in future. KEYWORDS— Bot; Botnet; C&C mechanism; communication protocols; honeynet; passive traffic; attacks; defense; preventaation; mitigation


Author(s):  
Tara H. Abraham

This chapter argues that the best way to understand McCulloch’s various identities is to understand them as performatively produced. Drawing on Judith Butler’s framework of performative identity, the chapter outlines the ways that McCulloch’s identities were neither straightforward products of his own agency nor solely shaped by his context. It also argues that in spite of McCulloch’s self-fashioning as a philosopher and his characterization of cybernetics as universal and unified, McCulloch’s identities varied and the cybernetic project was anything but unified. At the heart of McCulloch’s scientific practices were his ways of asking grand humanistic questions, his penchant for theoretical modelling, and his rhetorical strategies. Much of these practices were responses to his institutional and cultural milieux. When seen in this light, McCulloch’s brand of cybernetics was less focused on command and control and more on introducing new scientific practices to the life and human sciences.


IoT ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 236-248
Author(s):  
Andrew John Poulter ◽  
Simon J. Cox

Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This paper examines this problem in the context of IoT devices operating within C2 systems which do not have a trusted relationship with each other. We propose a solution which we call syndication, to provide a controlled mechanism to share data between C2 systems of devices without a fully trusted relationship. This paper builds upon previous work which established a lightweight protocol for secure C2 operations within the IoT. Using the proposed approach enables not only sharing of data but also permits the external controller to submit moderated requests for actions to be performed. The paper concludes by examining how this approach could also be adopted to provide secure guest access to connected systems in a domestic or commercial context.


2017 ◽  
Vol 22 (1) ◽  
pp. 10-17
Author(s):  
Janka Kosecová ◽  
Monika Grasseová-Motyčková

Abstract The Lessons Learned Process was introduced in the Czech Armed Forces in 2004. Since then the LL process has become a standard part of the command and control process as well as one of the tools generating input to abilities development of units, formations, and staffs at all levels. The LL process allows to learn from both own and others’ mistakes; it also allows to use the best general procedures in all functional areas of development and deployment of armed forces. Not only does the article describe achievements, it also focuses on barriers which impede the efficient development of the system and the LL process. The focus of the article lies in the LL process current state analysis; here the authors come to the conclusion that one of the main problems is that commanders misunderstand the LL process. Another obstacle is the way the identified LL are analysed at the strategic level of command. In the conclusion, recommendations describing the way the identified barriers can be overcome and thus ensure further process optimization are presented.


2019 ◽  
Vol 194 (4) ◽  
pp. 791-809
Author(s):  
Marek Strzoda ◽  
Dariusz Szkoluda

The Command and Control System of the Armed Forces of the Republic of Poland constitutes an essential element of the State Defense System. Its primary function is to enable decision-makers and commanders at all levels to make decisions and to create systems of actions that, in the course of the operation, achieve strategic, operational and tactical goals. Various external factors and internal conditions influence the structure and then the functioning of this system. This system is subject to continuous evaluation and, consequently, changes that are to lead to its improvement, so that the assumed goals are achieved efficiently and effectively. The article discusses three groups of conditions directly, and with certain factors indirectly, affecting the organization of the command and control system as well as its functioning. The first one concerns the change in the nature of modern security threats. With regard to the short characterization of hybrid activities, subliminal actions, and asymmetric threats, it was indicated how they determine the requirements regarding the organization and functioning of the Armed Forces Command and Command System adequate to such situations. The findings of the 2016 Strategic Defense Review and its result document – the Defense Concept of the Republic of Poland constitute the second group of factors. In the consequence of strategic analysis, the conclusions and recommendations included in the Concept should be taken into account when introducing changes to the command and control system. In the last part, it was pointed out how the decision to establish the Territorial Defense Forces (WOT) and the organizational assumptions resulting from it concerning their structure, tasks, and rules of operation influenced the changes in the Command and control System of the Polish Armed Forces. The conditions presented in particular parts of the study should be considered during the forecasted and partially implemented organizational and functional improvements to the Polish Armed Forces Command and control System.


Author(s):  
S. Voinova

The current state of worn industrial equipment and the resulting low performance indicators of its functioning, in particular, low environmental friendliness, are considered. It is shown that the normalization of the complex situation that has developed in production is an acute problem, the solution of which should begin with the implementation of a program for the partial renewal of worn equipment. It is pointed out that there is a high potential for improving the technological, including ecological, efficiency of functioning of the upgraded equipment. It is pointed out that the partial renewal is highly efficient, because of the small specific investments in it. The significant influence of the quality of control of the setting and implementation of the renewal program on its effectiveness was noted. It is shown that the process of renewal of worn-out equipment, ultimately, has an environmental focus, increases the environmental friendliness of the updated technical facility.


Sign in / Sign up

Export Citation Format

Share Document