Statements (35)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity concept
|
gptkbp:alsoKnownAs |
C2
|
gptkbp:canBe |
decentralized
peer-to-peer centralized |
gptkbp:countermeasures |
intrusion detection systems
network monitoring firewall rules threat intelligence feeds |
gptkbp:detects |
anomaly detection
signature-based detection behavioral analysis |
gptkbp:enables |
data exfiltration
execution of commands malware updates |
https://www.w3.org/2000/01/rdf-schema#label |
C&C (Command and Control)
|
gptkbp:purpose |
remote control of compromised systems
|
gptkbp:relatedTo |
malware
cyber attacks phishing campaigns advanced persistent threats command servers |
gptkbp:supportsProtocol |
gptkb:HTTP
gptkb:IRC HTTPS custom protocols DNS tunneling |
gptkbp:target |
botnets
infected endpoints |
gptkbp:usedBy |
cybercriminals
threat actors state-sponsored groups |
gptkbp:usedIn |
malware operations
|
gptkbp:bfsParent |
gptkb:Babylon_5_station
|
gptkbp:bfsLayer |
7
|