DGAs and cyber-criminals: a case study
Revision as of 12:00, 7 February 2015 by Eric.freyssinet (talk | contribs) (Created page with "{{Publication |Link=http://www.damballa.com/downloads/r_pubs/RN_DGAs-and-Cyber-Criminals-A-Case-Study.pdf damballa.com (pdf) }}")
(Publication) Google search: [1]
DGAs and cyber-criminals: a case study | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | / |
Editor/Conference | |
Link | http://www.damballa.com/downloads/r pubs/RN DGAs-and-Cyber-Criminals-A-Case-Study.pdf damballa.com (pdf) (damballa.com (pdf) Archive copy) |
Author | |
Type |
Abstract
“
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permittedBFR790, editor = {}, author = {}, title = {DGAs and cyber-criminals: a case study}, date = {01}, month = May, year = {}, howpublished = {\url{http://www.damballa.com/downloads/r_pubs/RN_DGAs-and-Cyber-Criminals-A-Case-Study.pdf damballa.com (pdf)}}, }