首页> 外文期刊>IEEE transactions on dependable and secure computing >Still Beheading Hydras: Botnet Takedowns Then and Now
【24h】

Still Beheading Hydras: Botnet Takedowns Then and Now

机译:仍在斩首九头蛇:僵尸网络的拆毁

获取原文
获取原文并翻译 | 示例

摘要

Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C) servers. The botnet problem reached such levels where federal law enforcement agencies have to step in and take actions against botnets by disrupting (or “taking down”) their C&Cs, and thus their illicit operations. Lately, more and more private companies have started to independently take action against botnet armies, primarily focusing on their DNS-based C&Cs. While well-intentioned, their C&C takedown methodology is in most cases ad-hoc, and limited by the breadth of knowledge available around the malware that facilitates the botnet. With this paper, we aim to bring order, measure, and reason to the botnet takedown problem. We improve an existing takedown analysis system called rza. Specifically, we examine additional botnet takedowns, enhance the risk calculation to use botnet population counts, and include a detailed discussion of policy improvements that can be made to improve takedowns. As part of our system evaluation, we perform a postmortem analysis of the recent 3322.org, Citadel, and No-IP takedowns.
机译:受恶意软件感染的设备通常在一个或多个命令与控制(C&C)服务器的影响下组成僵尸网络大军。僵尸网络问题达到了这样的程度,即联邦执法机构必须介入,并通过破坏(或“撤消”)其C&C并进而破坏其非法运营来对僵尸网络采取行动。最近,越来越多的私营公司开始对僵尸网络军队采取独立行动,主要集中在基于DNS的C&C。尽管有很好的用意,但在大多数情况下,他们的C&C删除方法是临时的,并且受到围绕有助于僵尸网络的恶意软件的广泛知识的限制。在本文中,我们旨在为僵尸网络删除问题带来顺序,度量和原因。我们改进了一个称为rza的现有下架分析系统。具体来说,我们研究了其他僵尸网络的删除活动,增强了使用僵尸网络人口计数的风险计算,并详细讨论了可以进行的政策改进以改进删除活动。作为我们系统评估的一部分,我们对最近的3322.org,Citadel和No-IP移除情况进行事后分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号