An Empirical Study of HTTP-based Financial Botnets

Aditya K. Sood, Sherali Zeadally, Richard J. Enbody

Research output: Contribution to journalArticlepeer-review

22 Scopus citations

Abstract

Cyber criminals are covertly attacking critical infrastructures, and botnets are a common component of those attacks. In recent years, botnets have been shifting their focus from broad-based attacks to more targeted ones such as attacking financial institutions, especially banks. The primary reason for this shift towards financial institutions is that, where the money is. We present an empirical study of the components, features and operations of some of the most widely deployed HTTP-based financial botnets (such as Zeus, SpyEye, ICE 1X, Citadel, Carberp, Tinba, Bugat and Shylock). Our study provides critical insights into the design of these botnets and should help the security community to generate intelligence and develop more robust security solutions to defend against cyber attacks by these botnets. In addition, our comparative analysis of insidious techniques pertaining to Command and Control (C&C) communication, system exploitation and data exfiltration also provides an effective and a holistic view of the capabilities of HTTP-based financial botnets. This study also highlights the evolution of various HTTP-based financial botnets over a period of time. Finally, we discuss security solutions that can help mitigate some of the techniques used by HTTP-based financial botnets.

Original languageEnglish
Article number6991594
Pages (from-to)236-251
Number of pages16
JournalIEEE Transactions on Dependable and Secure Computing
Volume13
Issue number2
DOIs
StatePublished - Mar 1 2016

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Attack
  • Botnet
  • Finance
  • Malware
  • Protocol
  • Security

ASJC Scopus subject areas

  • General Computer Science
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'An Empirical Study of HTTP-based Financial Botnets'. Together they form a unique fingerprint.

Cite this