Corpus ID: 28360605

Tracking and Mitigation of Malicious Remote Control Networks

@inproceedings{Holz2009TrackingAM,
  title={Tracking and Mitigation of Malicious Remote Control Networks},
  author={T. Holz},
  year={2009}
}
  • T. Holz
  • Published 2009
  • Engineering, Computer Science
  • Attacks against end-users are one of the negative side effects of today’s networks. The goal of the attacker is to compromise the victim’s machine and obtain control over it. This machine is then used to carry out denial-of-service attacks, to send out spam mails, or for other nefarious purposes. From an attacker’s point of view, this kind of attack is even more efficient if she manages to compromise a large number of machines in parallel. In order to control all these machines, she establishes… CONTINUE READING
    4 Citations
    Development of Research on Botnet Defenses, From the Viewpoint of Botnet Lifecycle
    • 3
    Data-only Malware
    • 2
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 163 REFERENCES
    Detecting honeypots and other suspicious environments
    • T. Holz, F. Raynal
    • Computer Science
    • Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop
    • 2005
    • 174
    • PDF
    Analysis of a denial of service attack on TCP
    • 517
    • PDF
    Vulnerabilities of Passive Internet Threat Monitors
    • 85
    • PDF
    Botnets: Big and Bigger
    • 134
    Traffic Aggregation for Malware Detection
    • 206
    • PDF
    Wide-Scale Botnet Detection and Characterization
    • 386
    • PDF