Your botnet is my botnet: analysis of a botnet takeover
- Brett Stone-Gross, M. Cova, Giovanni Vigna
- Computer ScienceConference on Computer and Communications…
- 9 November 2009
This paper reports on efforts to take control of the Torpig botnet and study its operations for a period of ten days, which provides a new understanding of the type and amount of personal information that is stolen by botnets.
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns
- Brett Stone-Gross, Thorsten Holz, G. Stringhini, Giovanni Vigna
- Computer ScienceUSENIX Workshop on Large-Scale Exploits and…
- 29 March 2011
A comprehensive analysis of a large-scale botnet from the botmaster's perspective is presented, that highlights the intricacies involved in orchestrating spam campaigns such as the quality of email address lists, the effectiveness of IP-based blacklisting, and the reliability of bots.
FIRE: FInding Rogue nEtworks
- Brett Stone-Gross, Christopher Krügel, K. Almeroth, Andreas Moser, E. Kirda
- Computer ScienceAsia-Pacific Computer Systems Architecture…
- 7 December 2009
Fire is presented, a novel system to identify and expose organizations and ISPs that demonstrate persistent, malicious behavior and can be used to pinpoint and to track the activity of rogue organizations, preventing criminals from establishing strongholds on the Internet.
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus
- Dennis Andriesse, C. Rossow, Brett Stone-Gross, D. Plohmann, H. Bos
- Computer Science8th International Conference on Malicious and…
- 2013
Through a detailed analysis of this new Zeus variant, this work demonstrates the high resilience of state of the art peer-to-peer botnets in general, and of peer- to-peer Zeus in particular.
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
- C. Rossow, Dennis Andriesse, H. Bos
- Computer ScienceIEEE Symposium on Security and Privacy
- 19 May 2013
A formal graph model is introduced to capture the intrinsic properties and fundamental vulnerabilities of P2P botnets and can be used to assist security researchers in evaluating mitigation strategies against current and future P2p botnets.
Understanding fraudulent activities in online ad exchanges
- Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, R. Kemmerer, Christopher Krügel, Giovanni Vigna
- Computer Science, BusinessACM/SIGCOMM Internet Measurement Conference
- 2 November 2011
A detailed view of how one of the largest ad exchanges operates and the associated security issues from the vantage point of a member ad network is presented.
The Underground Economy of Fake Antivirus Software
- Brett Stone-Gross, Ryan Abman, R. Kemmerer, Christopher Krügel, D. Steigerwald
- Computer ScienceWorkshop on the Economics of Information Security
- 1 June 2011
An economic model is presented that demonstrates that fake AV companies are actively monitoring the refunds (chargebacks) that customers demand from their credit card providers, which can potentially be leveraged by vigilant payment processors and credit card companies to identify and ban fraudulent firms.
Two years of short URLs internet measurement: security threats and countermeasures
- F. Maggi, Alessandro Frossi, Giovanni Vigna
- Computer ScienceThe Web Conference
- 13 May 2013
Despite short URLs being a significant, new security risk, in accordance with the reports resulting from the observation of the overall phishing and spamming activity, it is found that only a relatively small fraction of users ever encountered malicious short URLs.
Analysis of a Botnet Takeover
- Brett Stone-Gross, M. Cova, Bob Gilbert, R. Kemmerer, Christopher Krügel, Giovanni Vigna
- Computer ScienceIEEE Security and Privacy
- 2011
The authors report on their efforts to take control of the Torpig botnet and study its operations for a period of 10 days, during which they observed more than 180,000 infections and recorded almost 70 Gbytes of data that the bots collected.
P 2 PWNED : Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
- C. Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, D. Plohmann, H. Bos
- Computer Science
- 2013
A formal graph model is introduced to capture the intrinsic properties and fundamental vulnerabilities of P2P botnets and can be used to assist security researchers in evaluating mitigation strategies against current and future P2p botnets.
...
...