Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Botnet Detection and Tracking
³Rallying´ the Botnet
Botnet Application: Phishing
Phishing: Detection and Research
Open Research Questions
Detection: In-Protocol
DNS Monitoring
Modeling Botnet Propagation
Modeling Propagation: Single TZ
Spread across multiple timezones
Experimental Validation
Fitting the model to the data
Applications of the model
New Trend: Social Engineering
Early Botnets: AgoBot (2003)
Botnet Operation
PhatBot (2004)
Peer-to-Peer Control
A Model of Responsiveness
Measuring Responsiveness
Inferring DoS Activity
Backscatter Analysis
Inferred DoS Activity
DDoS: Setting up the Infrastructure
Online Scams
Online Scam Hosting is Dynamic
Overview of Dynamics
Why Study Dynamics?
Summary of Findings
Data Collection
Top 3 Spam Campaigns
Time Between Changes
Rates of Change
Location of Change in Hierarchy
Location in IP Address Space
Distribution of DNS Records
Registrars Involved in Changes
0 of .
Results for:
No results containing your search query
P. 1
Botnets Infrastructure and Attacks

Botnets Infrastructure and Attacks

Ratings: (0)|Views: 43|Likes:
Published by ianpcox

More info:

Published by: ianpcox on Jun 14, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 6 to 51 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->