【24h】

Your botnet is my botnet

机译:您的僵尸网络是我的僵尸网络

获取原文
获取原文并翻译 | 示例

摘要

Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this paper, we report on our efforts to take control of the Torpig botnet and study its operations for a period of ten days. During this time, we observed more than 180 thousand infections and recorded almost 70 GB of data that the bots collected. While botnets have been "hijacked" and studied previously, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of data from the infected victims. This data provides a new understanding of the type and amount of personal information that is stolen by botnets.
机译:僵尸网络是由对手控制的感染了恶意软件的机器的网络,是Internet上许多安全问题的根本原因。 Torpig是一种特别复杂,阴险的机器人,它是一种恶意软件程序,旨在从其受害者那里获取敏感信息(例如银行帐户和信用卡数据)。在本文中,我们报告了我们为控制Torpig僵尸网络所做的努力,并研究了其为期十天的运行情况。在此期间,我们观察到超过18万次感染,并记录了机器人收集的近70 GB数据。虽然僵尸网络已被“劫持”并进行了先前的研究,但Torpig僵尸网络具有某些属性,这些属性使对数据的分析特别有趣。首先,有可能(以合理的准确性)识别独特的机器人感染并将该数字与联系我们的命令和控制服务器的120万个IP地址相关联。其次,Torpig僵尸网络很大,针对各种应用程序,并从受感染的受害者那里收集了丰富多样的数据集。这些数据使人们对僵尸网络窃取的个人信息的类型和数量有了新的认识。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号