Your Botnet is My Botnet: Analysis of a Botnet Takeover. Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna. Outline. Introduction Domain flux Taking control of the Botnet Botnet analysis
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna
•sending spam mails
• launching denial-of-service attacks
• stealing personal data such as mail accounts or bank credentials.
it is possible to change the mapping of a botnet domain to a machine which is controlled by the defender .
Generating those domains requires an inexpensive modiﬁcation while registering them costs time and money
Author protected the victims according to:
Figure 11 shows the new infections over time.
Thank you botnet’s live population, with a difference of 36.5% between IP addresses and bot IDs. & Question?