Take a deep breath: a stealthy, resilient and cost-effective botnet using skype

  • Authors:
  • Antonio Nappa;Aristide Fattori;Marco Balduzzi;Matteo Dell'Amico;Lorenzo Cavallaro

  • Affiliations:
  • DICo, Università degli Studi di Milano, Italy;DICo, Università degli Studi di Milano, Italy;Eurecom, Sophia-Antipolis, France;Eurecom, Sophia-Antipolis, France;Faculty of Sciences, Vrije Universiteit Amsterdam, The Netherlands

  • Venue:
  • DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed source application, an API allows developers to build custom plugins which interact over the Skype network, taking advantage of its reliability and capability to easily bypass firewalls and NAT devices. Since the protocol is completely undocumented, Skype traffic is particularly hard to analyze and to reverse engineer. We propose a novel botnet model that exploits an overlay network such as Skype to build a parasitic overlay, making it extremely difficult to track the botmaster and disrupt the botnet without damaging legitimate Skype users. While Skype is particularly valid for this purpose due to its abundance of features and its widespread installed base, ourmodel is generically applicable to distributed applications that employ overlay networks to send direct messages between nodes (e.g., peer-to-peer software with messaging capabilities). We are convinced that similar bot-netmodels are likely to appear into the wild in the near future and that the threats they pose should not be underestimated. Our contribution strives to provide the tools to correctly evaluate and understand the possible evolution and deployment of this phenomenon.