Difference between revisions of "The Waledac protocol: the how and why"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
|Botnet=Waledac, | |Botnet=Waledac, | ||
|Year=2009 | |Year=2009 | ||
|Date=2009-10-13 | |||
|Editor=Malicious and Unwanted Software (MALWARE) | |||
|DOI=10.1109/MALWARE.2009.5403015 | |||
|Author=Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang, | |||
|Type=Conference paper or presentation | |Type=Conference paper or presentation | ||
|Abstract=Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others. | |Abstract=Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others. | ||
}} | }} |
Latest revision as of 21:55, 2 August 2015
(Publication) Google search: [1]
The Waledac protocol: the how and why | |
---|---|
Botnet | Waledac |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2009 / 2009-10-13 |
Editor/Conference | Malicious and Unwanted Software (MALWARE) |
Link | DOI: 10.1109/MALWARE.2009.5403015 |
Author | Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang |
Type | Conference paper or presentation |
Abstract
“ Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR2181, editor = {Malicious and Unwanted Software (MALWARE)}, author = {Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang}, title = {The Waledac protocol: the how and why}, date = {13}, month = Oct, year = {2009},
doi = {10.1109/MALWARE.2009.5403015}, howpublished = {\url{}}, }