Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

1 Introduction
2 Background
2.1 Botnet
2.2 Botnet architectures
2.2.1 Centralized
2.2.2 Decentralized
2.2.3 Hybrid
2.3 History
2.4 Evasion tactics
2.4.1 Fast-flux DNS
2.4.2 Peer-to-peer obfuscation
2.4.3 Rootkits
2.4.4 Low presence
2.4.5 Polymorphism
3 CASE STUDY: PEACOMM
3 Case study: Peacomm
3.1 Introduction
3.2 Test environment
3.3 Social engineering
3.5 Peacomm communications
3.6 Comparison with legimate P2P traffic
3.6.1 Bittorrent traffic
3.6.2 eMule traffic
3.6.3 DC++ traffic
3.6.4 Online game traffic
3.7 Secondary injections
3.8 Network analysis
3.8.1 Infection
3.8.2 Production environment
3.8.3 Open connections
4 Detection
4.1 Protocol traffic
4.2 SMTP & MX queries
4.3 Connections
5 CONCLUSION AND FUTURE WORK
5 Conclusion and future work
A Attachments
A.1 Peacomm fast-fluxnetwork
A.1.1 Abstract
A.1.2 Analysis
A.2 Sandbox
A.2.1 CWSandbox 2.0.33
A.2.2 Virus Total Scan 1.0.0
0 of .
Results for:
No results containing your search query
P. 1
Botnet

Botnet

Ratings: (0)|Views: 122 |Likes:
Published by dedyosso

More info:

Published by: dedyosso on Apr 11, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/26/2013

pdf

text

original

You're Reading a Free Preview
Pages 6 to 56 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->