Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,279,233 papers from all fields of science
Search
Sign In
Create Free Account
Torpig
Known as:
Sinowal
Torpig, also known as Sinowal or Anserin is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Adobe Flash
Adobe Shockwave
Antivirus software
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Malware visualization methods based on deep convolution neural networks
Zhuojun Ren
,
Guang Chen
,
Wenke Lu
Multimedia tools and applications
2019
Corpus ID: 209371360
In this paper, we propose two visualization methods for malware analysis based on n-gram features of byte sequences. The space…
Expand
2014
2014
On botnet behaviour analysis using GP and C4.5
Fariba Haddadi
,
Dylan Runkel
,
N. Zincir-Heywood
,
Malcolm I. Heywood
Annual Conference on Genetic and Evolutionary…
2014
Corpus ID: 11396754
Botnets represent a destructive cyber security threat that aim to hide their malicious activities within legitimate Internet…
Expand
2013
2013
Tracking and Characterizing Botnets Using Automatically Generated Domains
S. Schiavoni
,
F. Maggi
,
L. Cavallaro
,
S. Zanero
arXiv.org
2013
Corpus ID: 2887133
Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures. Recent works…
Expand
2012
2012
Shedding Light on Log Correlation in Network Forensics Analysis
Elias Raftopoulos
,
M. Egli
,
X. Dimitropoulos
International Conference on Detection of…
2012
Corpus ID: 16370822
Presently, forensics analyses of security incidents rely largely on manual, ad-hoc, and very time-consuming processes. A security…
Expand
Highly Cited
2011
Highly Cited
2011
Winning with DNS Failures: Strategies for Faster Botnet Detection
Sandeep Yadav
,
A. Reddy
Security and Privacy in Communication Networks
2011
Corpus ID: 5885537
Botnets such as Conficker and Torpig utilize high entropy domains for fluxing and evasion. Bots may query a large number of…
Expand
Highly Cited
2011
Highly Cited
2011
Analysis of a Botnet Takeover
Brett Stone-Gross
,
M. Cova
,
Bob Gilbert
,
R. Kemmerer
,
Christopher Krügel
,
Giovanni Vigna
IEEE Security and Privacy
2011
Corpus ID: 7798933
Botnets, networks of malware-infected machines (bots) that are controlled by an adversary, are the root cause of a large number…
Expand
2010
2010
Benchmarking IP blacklists for financial botnet detection
David Oro
,
Jesus Luna
,
Toni Felguera
,
M. Vilanova
,
Jetzabel M. Serna
Sixth International Conference on Information…
2010
Corpus ID: 17498423
Every day, hundreds or even thousands of computers are infected with financial malware (i.e. Zeus) that forces them to become…
Expand
2010
2010
Mac security: An Apple that can't be bitten?
S. Furnell
Network Security
2010
Corpus ID: 206126406
2008
2008
'Sinowal': un buen ejemplo del 'malware' 2.0
S. D. L. Santos
2008
Corpus ID: 215882981
2006
2006
Technical Development of Cyber Crime
Rolf Schulz
International Conference on IT-Incidents…
2006
Corpus ID: 1105828
PCT No. PCT/FR79/00055 Sec. 371 Date Feb. 29, 1980 Sec. 102(e) Date Feb. 29, 1980 PCT Filed Jun. 29, 1979 PCT Pub. No. WO80/00121…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE