Abstract

Network protocol reverse engineering of botnet command and control (C&C) is a challenging task, which requires various manual steps and a significant amount of domain knowledge. Furthermore, most of today's C&C protocols are encrypted, which prevents any analysis on the traffic without first discovering the encryption algorithm and key. To address these challenges, we present an end-to-end system for automatically discovering the encryption algorithm and keys, generating a protocol specification for the C&C traffic, and crafting effective network signatures. In order to infer the encryption algorithm and key, we enhance state-of-the-art techniques to extract this information using lightweight binary analysis. In order to generate protocol specifications we infer field types purely by analyzing network traffic. We evaluate our approach on three prominent malware families: Sality, ZeroAccess and Ramnit. Our results are encouraging: the approach decrypts all three protocols, detects 97% of fields whose semantics are supported, and infers specifications that correctly align with real protocol specifications.

Keywords:
Botnet Computer science Encryption Protocol (science) Malware Reverse engineering Key (lock) Task (project management) Computer network Inference Computer security Artificial intelligence Programming language Operating system The Internet

Metrics

24
Cited By
2.02
FWCI (Field Weighted Citation Impact)
31
Refs
0.87
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Detecting encrypted botnet traffic

Han ZhangChristos PapadopoulosDan Massey

Year: 2013 Vol: 5789 Pages: 163-168
JOURNAL ARTICLE

BoNC: Discovering and Classifying Novel Encrypted Botnet Traffic

Huancheng HuZiyun LiChristian Doerr

Journal:   IEEE Open Journal of the Communications Society Year: 2025 Vol: 6 Pages: 10845-10860
JOURNAL ARTICLE

User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes

Xiaoyu JiYushi ChengWenyuan XuXinyan Zhou

Journal:   Security and Communication Networks Year: 2018 Vol: 2018 Pages: 1-10
© 2026 ScienceGate Book Chapters — All rights reserved.