The Waledac protocol: the how and why

From Botnets.fr
Jump to navigation Jump to search

(Publication) Google search: [1]

The Waledac protocol: the how and why
Botnet Waledac
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2009 / 2009-10-13
Editor/Conference Malicious and Unwanted Software (MALWARE)
Link
DOI: 10.1109/MALWARE.2009.5403015
Author Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang
Type Conference paper or presentation

Abstract

Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2009BFR2181,
   editor = {Malicious and Unwanted Software (MALWARE)},
   author = {Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang},
   title = {The Waledac protocol: the how and why},
   date = {13},
   month = Oct,
   year = {2009},
doi = {10.1109/MALWARE.2009.5403015}, howpublished = {\url{}}, }