2010 Eighth International Conference on Privacy, Security and Trust 2010
DOI: 10.1109/pst.2010.5593240
|View full text |Cite
|
Sign up to set email alerts
|

On the analysis of the Zeus botnet crimeware toolkit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
103
0
4

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 152 publications
(107 citation statements)
references
References 5 publications
0
103
0
4
Order By: Relevance
“…Under normal operation (i.e. with no malware injected) 6 all of the feature vectors are combined into a training dataset for the one-class SVM formulation. Conversely, under detection conditions each newly monitored and post-processed feature vector is tested against the training data in order to determine whether it is anomalous or normal.…”
Section: Cloud Resilience Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Under normal operation (i.e. with no malware injected) 6 all of the feature vectors are combined into a training dataset for the one-class SVM formulation. Conversely, under detection conditions each newly monitored and post-processed feature vector is tested against the training data in order to determine whether it is anomalous or normal.…”
Section: Cloud Resilience Architecturementioning
confidence: 99%
“…The Kelihos malware was first detected in 2010 and has since been developed into new variants that perform a range of attacks such as phishing and spamming [5]. Zeus was first detected in 2010 [6], but since then there has been a plethora of new variants that even recently (July 2014) compromised millions of machines and gave rise to a botnet that could steal sensitive banking information [7].…”
Section: Introductionmentioning
confidence: 99%
“…The first Zeus malware instant was detected in 2010 [14] but since then there is a plethora of new variants that even recently (July 2014) compromised millions of machines and enabled a botnet that could steal sensitive banking information [13].…”
Section: A Data Measurementsmentioning
confidence: 99%
“…Due to their intrinsic characteristics of reliability and robustness, P2P based networks are often used as botnet architectures, since it is particularly difficult to detect and dismantling them [18]- [20]. For instance, the Phatbot botnet adopts a P2P based communication system that makes use of the WASTE protocol [21] and connects the agents using a Gnutella caching server [22].…”
Section: B P2p Based Modelsmentioning
confidence: 99%