Botconf 2013

Distributed Malware Proxy Networks

Distributed Malware Proxy Networks Botconf 2013 Thursday | 11:30 – 12:10 Brad Porter 🗣 | Nick Summerlin This presentation discusses several existing proxy networks used in malware campaigns and our efforts to track them in an automated fashion. Criminals are increasingly turning to proxy networks to provide an additional layer of protection between their adversaries (law enforcement

Distributed Malware Proxy Networks Read More »

Legal limits of proactive actions: Coreflood botnet example

Legal limits of proactive actions: Coreflood botnet example Botconf 2013 Thursday | 13:00 – 13:20 Oğuz Kaan Pehlivan 🗣 Passive defense mechanisms are necessary component of well-designed cyber defense programs but they are no longer sufficient to address increasingly sophisticated threats. Thus, addressing the threats more comprehensively may require additional mechanisms. So, active cyber defense

Legal limits of proactive actions: Coreflood botnet example Read More »

Using cyber intelligence to detect and localize botnets

Using cyber intelligence to detect and localize botnets Botconf 2013 Thursday | 13:40 – 14:00 Enrico Branca 🗣 Our purpose is to present a cyber intelligence system created to analyze network communications in order to detect and identify botnet activities and distribution of malware related to botnets, both over the internet and within targeted networks.

Using cyber intelligence to detect and localize botnets Read More »

Scroll to Top