Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Waledac botnet

Known as: Waledac 
Waledac, also known by its aliases Waled and Waledpak, was a botnet mostly involved in e-mail spam and malware. In March 2010 the botnet was taken… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In this paper, some clustering techniques are analyzed to compare their ability to detect botnet traffic by selecting features… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
2013
2013
L'objectif de cette these est le developpement de methodes de comprehension des logiciels malveillants, afin d'aider l'analyste… Expand
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
Highly Cited
2012
Highly Cited
2012
Analyzing cryptographic implementations has important applications, especially for malware analysis where they are an integral… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
2012
2012
Botnets are the most serious network security threat bothering cyber security researchers around the globe. In this paper, we… Expand
  • table 1
  • table 2
  • figure 2
  • figure 3
  • figure 4
2010
2010
In this study, we advance the understanding of botmaster-owned systems in an advanced botnet, Waledac, through the analysis of… Expand
  • figure 1
  • figure 2
  • figure 3
2009
2009
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol is the most… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 8
Highly Cited
2009
Highly Cited
2009
A botnet is a network of compromised machines under the control of an attacker. Botnets are the driving force behind several… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
Peer to Peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more… Expand
  • figure 1
  • table 1
  • table 2
Review
2009
Review
2009
Botnets are networks of compromised computer systems used to perform various criminal activities on the Internet. This thesis… Expand
2009
2009
Addressing and mitigating modern global-scale botnets is a pressing Internet security issue, particularly, given that these… Expand
  • figure 1
  • table 1
  • table 2
  • figure 3
  • figure 2