Back close

Guarding Against Command and Control (C2) Agents Utilizing Real-World Applications for Communication Channels

Publication Type : Conference Paper

Publisher : IEEE

Source : 2024 5th International Conference for Emerging Technology (INCET)

Url : https://doi.org/10.1109/incet61516.2024.10593568

Campus : Amritapuri

School : School of Computing

Department : Computer Science and Applications

Year : 2024

Abstract : Command and Control (C2) agents are a criti-cal component of many cyberattacks, enabling adversaries to maintain covert control over compromised systems. In recent years, attackers have increasingly leveraged real-world applications, such as social media and collaborative platforms, as C2 channels to evade detection. This paper proposes a behavioural-based network-level filtering approach to enhance cybersecurity defences against these threats. The suggested method includes creating a way to look at network traffic and find patterns and oddities that point to C2 agent activity, as well as setting up network-level filtering to spot malicious traffic and attempts to communicate from C2 agents. This network-level filtering approach aims to provide a proactive and effective defence against C2 attacks, particularly those utilising non-traditional communication channels. Initial results, obtained through testing a Random Forest model on real-world traffic, demonstrate promising outcomes, with the model successfully distinguishing between benign and malicious activities.

Cite this Research Publication : Vidhun K, Jinesh M. Kannimoola, Guarding Against Command and Control (C2) Agents Utilizing Real-World Applications for Communication Channels, 2024 5th International Conference for Emerging Technology (INCET), IEEE, 2024, https://doi.org/10.1109/incet61516.2024.10593568

Admissions Apply Now