Network Traffic Analysis of ZeroAccess Bot
@inproceedings{Garg2014NetworkTA, title={Network Traffic Analysis of ZeroAccess Bot}, author={Shree Garg and A. K. Sarje and S. K. Peddoju}, year={2014} }
Botnets have become a general-purpose platform to perform malicious cyber-activity and extortion. Botnets use specially designed communication channels to receive commands from their operators and respond accordingly. In early design of botnets, botmasters used the centralized control. However, in order to overcome the failures due to centralized control, botnet community has started using distributed P2P architecture and also designing their own protocol to efficiently handle their bots… CONTINUE READING
Figures and Tables from this paper
3 Citations
Scalable P2P bot detection system based on network data stream
- Computer Science
- Peer Peer Netw. Appl.
- 2016
- 8
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
- Computer Science
- 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
- 2018
- 2
Network-based detection of Android malicious apps
- Computer Science
- International Journal of Information Security
- 2016
- 20
References
SHOWING 1-7 OF 7 REFERENCES
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
- Computer Science
- LEET
- 2008
- 452
- PDF
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
- Computer Science
- 2013 IEEE Symposium on Security and Privacy
- 2013
- 160
- PDF
The waledac protocol: The how and why
- Computer Science
- 2009 4th International Conference on Malicious and Unwanted Software (MALWARE)
- 2009
- 80
- PDF
Europol and industry partners disrupt the notorious ZeroAccess botnet http://www.microsoft.com/en- us/news/press
- Europol and industry partners disrupt the notorious ZeroAccess botnet http://www.microsoft.com/en- us/news/press
- 2013
The ZeroAccess Botnet – Mining and Fraud for Massive Financial Gain
- Sophos Technical Paper,
- 2012
The ZeroAccess Botnet – Mining and Fraud for Massive Financial Gain, Sophos Technical Paper
- The ZeroAccess Botnet – Mining and Fraud for Massive Financial Gain, Sophos Technical Paper
- 2012
ZeroAccess Infection Analysis
- ZeroAccess Infection Analysis
- 2012