Statements (35)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_concept
|
| gptkbp:alsoKnownAs |
C2
|
| gptkbp:canBe |
decentralized
peer-to-peer centralized |
| gptkbp:countermeasures |
intrusion detection systems
network monitoring firewall rules threat intelligence feeds |
| gptkbp:detects |
anomaly detection
signature-based detection behavioral analysis |
| gptkbp:enables |
data exfiltration
execution of commands malware updates |
| gptkbp:purpose |
remote control of compromised systems
|
| gptkbp:relatedTo |
gptkb:malware
cyber attacks phishing campaigns advanced persistent threats command servers |
| gptkbp:supportsProtocol |
gptkb:HTTP
gptkb:IRC HTTPS custom protocols DNS tunneling |
| gptkbp:target |
botnets
infected endpoints |
| gptkbp:usedBy |
cybercriminals
threat actors state-sponsored groups |
| gptkbp:usedIn |
malware operations
|
| gptkbp:bfsParent |
gptkb:Babylon_5_station
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
C&C (Command and Control)
|