So you want to take over a botnet

作者: David Dittrich

DOI:

关键词:

摘要: Computer criminals regularly construct large distributed attack networks comprised of many thousands compromised computers around the globe. Once constituted, these are used to perform computer crimes, creating yet other sets victims secondary such as denial service attacks, spam delivery, theft personal and financial information for performing fraud, exfiltration proprietary competitive advantage (industrial espionage), etc. The arms race between criminal actors who create operate botnets security industry research community actively trying take down is escalating in aggressiveness. As sophistication level botnet engineering operations increases, so does demand on reverse engineering, understanding weaknesses design that can be exploited defensive (or counter-offensive) side, possibility actions or eradicate may cause unintended consequences.

参考文章(12)
Kenneth Einar Himma, David Dittrich, Active Response to Computer Intrusions Social Science Research Network. ,(2005) , 10.2139/SSRN.790585
Fabian Monrose, Jay Zarfoss, Moheeb Abu Rajab, Andreas Terzis, My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging conference on workshop on hot topics in understanding botnets. pp. 5- 5 ,(2007)
Vern Paxson, Chris Grier, Juan Caballero, Dawn Song, Chia Yuan Cho, Insights from the inside: a view of botnet management from infiltration usenix conference on large scale exploits and emergent threats. pp. 2- 2 ,(2010)
David Dittrich, Felix Leder, Tillmann Werner, A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets Financial Cryptography and Data Security. pp. 216- 230 ,(2010) , 10.1007/978-3-642-14992-4_20
Greg Sinclair, Chris Nunnery, Brent ByungHoon Kang, The waledac protocol: The how and why international conference on malicious and unwanted software. pp. 69- 77 ,(2009) , 10.1109/MALWARE.2009.5403015
Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Your botnet is my botnet: analysis of a botnet takeover computer and communications security. pp. 635- 647 ,(2009) , 10.1145/1653662.1653738
Tyler Moore, Richard Clayton, Ethical Dilemmas in Take-Down Research Financial Cryptography and Data Security. pp. 154- 168 ,(2012) , 10.1007/978-3-642-29889-9_14
Levi Lloyd, Ken Chiang, A case study of the rustock rootkit and spam bot conference on workshop on hot topics in understanding botnets. pp. 10- 10 ,(2007)
Lasse Trolle Borup, Peer-to-peer botnets: A case study on Waledac IMM-M.Sc.-2009-24. ,(2009)
Sven Dietrich, David Dittrich, John Hernandez, Sam Stover, Analisys of the storm and nugache trojans: P2P is here ;login:: the magazine of USENIX & SAGE. ,vol. 32, pp. 18- 27 ,(2007)