Back to Results
First PageMeta Content
Computer network security / Internet / Botnets / Email / Email spam / Storm botnet / Mega-D botnet / McColo / Spam / Computing / Spamming / Multi-agent systems


Insights from the Inside: A View of Botnet Management from Infiltration Chia Yuan Cho§ , Juan Caballero†§ , Chris Grier§ , Vern Paxson‡§ , and Dawn Song§ § UC Berkeley † Carnegie Mellon University ‡ ICSI
Add to Reading List

Document Date: 2011-03-08 19:40:30


Open Document

File Size: 362,34 KB

Share Result on Facebook

Company

Figure / 3M / Google / MURI Grant Group / Microsoft / MegaD / /

Event

Labor Issues / /

Facility

Carnegie Mellon University / /

IndustryTerm

security applications / cumulative unique set search / template server / search engines locating / botnet infrastructure / enSMTP server / normal web servers / Internet Rate-limiting bypass / drop server / onion router / ter server / spam dialog master server / spam master server / Internet Measurement Conference / through online repositories / botnet management / notification protocol / search engine / conducted using drop server / /

MarketIndex

set 15 / /

Organization

National Science Foundation / UC Berkeley / USAF office of Scientific Reelements / Carnegie Mellon University / /

Person

Thorsten Holz / Dawn Song / Atif Mushtaq / Juan Caballero / Matt Williamson / Yuan Cho / Chris Grier / Moheeb Abu Rajab / Andreas Terzis / Roger Dingledine / Paul Syverson / Christian Kreibich / Alexander Moshchuk / Nick Mathewson / Chris Kanich / John P. John / Jay Zarfoss / Fabian Monrose / Arvind Krishnamurthy / Steven D. Gribble / /

Product

MegaD / /

ProgrammingLanguage

HTML / /

Technology

MegaD C&C protocol / tom C&C protocol / search engine / same C&C protocol / HTML / notification protocol / C&C protocol / encrypted C&C protocol / second-generation onion router / HTTP / ISP / reverseengineering C&C protocols / /

URL

http /

SocialTag