Programs
- M. Tech. in Automotive Engineering -Postgraduate
- An Advanced Study of Yoga Sutra of Rishi Patanjali (With Basics of Samkhya) -
Publication Type : Conference Paper
Publisher : IEEE
Source : 2024 5th International Conference for Emerging Technology (INCET)
Url : https://doi.org/10.1109/incet61516.2024.10593568
Campus : Amritapuri
School : School of Computing
Department : Computer Science and Applications
Year : 2024
Abstract : Command and Control (C2) agents are a criti-cal component of many cyberattacks, enabling adversaries to maintain covert control over compromised systems. In recent years, attackers have increasingly leveraged real-world applications, such as social media and collaborative platforms, as C2 channels to evade detection. This paper proposes a behavioural-based network-level filtering approach to enhance cybersecurity defences against these threats. The suggested method includes creating a way to look at network traffic and find patterns and oddities that point to C2 agent activity, as well as setting up network-level filtering to spot malicious traffic and attempts to communicate from C2 agents. This network-level filtering approach aims to provide a proactive and effective defence against C2 attacks, particularly those utilising non-traditional communication channels. Initial results, obtained through testing a Random Forest model on real-world traffic, demonstrate promising outcomes, with the model successfully distinguishing between benign and malicious activities.
Cite this Research Publication : Vidhun K, Jinesh M. Kannimoola, Guarding Against Command and Control (C2) Agents Utilizing Real-World Applications for Communication Channels, 2024 5th International Conference for Emerging Technology (INCET), IEEE, 2024, https://doi.org/10.1109/incet61516.2024.10593568