Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation
Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation Botconf 2019 Friday | 14:00 – 14:30 Matthijs Bomhoff 🗣 | Saskia Hoogma 🗣 Encrypted C&C data can make the life of malware analysts and incident handlers a lot harder, as it can make C&C traffic a lot harder to recognise, when done right. Fortunately, […]
Using a Cryptographic Weakness for Malware Traffic Clustering and IDS Rule Generation Read More »