Detection and Analysis of Command and Control (C2) Connections in Cybersecurity with C2Sentinel


Mansurov A., YAKUT Ö.

9th International Symposium on Innovative Approaches in Smart Technologies, ISAS 2025, Gaziantep, Türkiye, 27 - 28 Haziran 2025, (Tam Metin Bildiri) identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Doi Numarası: 10.1109/isas66241.2025.11101808
  • Basıldığı Şehir: Gaziantep
  • Basıldığı Ülke: Türkiye
  • Anahtar Kelimeler: beaconing detection, command and control, cybersecurity, network management
  • Kocaeli Üniversitesi Adresli: Evet

Özet

Growing reliance on hidden Command and Control (C2) channels for cyberattacks has made conventional detection methodologies obsolete. Such ineffectiveness can be dangerous, especially for non-tech users and small businesses. In response, C2Sentinel has been conceived as a cybersecurity solution that not only detects malware but also monitors the malicious actors, such as botmasters or attacker infrastructure, behind C2 operations. By conducting network behavioral analysis, coupled with validation of suspected IP addresses and domains in malware repositories, C2Sentinel successfully detects concealed communications within the network, identifying malicious activities like beaconing as indicators of ongoing C2 operations. With its intuitive interface and real-time alerts through messaging applications like Telegram, C2Sentinel allows non-tech users to respond quickly to cyber threats like ransomware and data breaches. By providing an easy-to-use platform for identifying and analyzing concealed communication channels, overall cybersecurity is greatly improved through C2Sentinel.