Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653738
|View full text |Cite
|
Sign up to set email alerts
|

Your botnet is my botnet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 384 publications
(33 citation statements)
references
References 14 publications
0
33
0
Order By: Relevance
“…Although, a significant effort to contain BredoLab's threats by security community and lawenforcement is spent, recent researches showed that BredoLab and its variants are still widely spread. Moreover, complex infection and spreading techniques that are found only in BredoLab malware samples are, unfortunately, now employed in other major malware families [13][14].…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although, a significant effort to contain BredoLab's threats by security community and lawenforcement is spent, recent researches showed that BredoLab and its variants are still widely spread. Moreover, complex infection and spreading techniques that are found only in BredoLab malware samples are, unfortunately, now employed in other major malware families [13][14].…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Furthermore, the paper illustrated the law enforcement procedures to forensically acquire and investigate BredoLab, and to develop required knowledge and control to support prosecution using proposed model. Most take-downs take months or even years of research to attempt a take-down [14,15]. In the case of the Bredolab investigation a wiretap on the VPN server from the main suspect proved to be enough to get the data needed to take-down the botnet and start prosecution.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…However, botnets are constantly evolving with new cloaking and obfuscation mechanisms being developed constantly. For instance, Torpig [17] and Conficker [18] are recent botnets that make heavy use of domain name fluxing. Here, the botnets generate a very large number of domain names (typically based on a generating algorithm) to which connections are attempted.…”
Section: Discussionmentioning
confidence: 99%
“…The goal of these efforts has been to characterize botnet activities [24], analyze C&C communication methods [8], and estimate the respective botnet size and geographical properties [27]. Their observations have been used to fine tune network defences [14] and tailor novel detection mechanisms [16].…”
Section: Related Workmentioning
confidence: 99%