Highly resilient peer-to-peer botnets are here:An analysis of Gameover Zeus
Autor: | Brett Stone-Gross, Christian Rossow, Dennis Andriesse, Herbert Bos, Daniel Plohmann |
---|---|
Přispěvatelé: | Computer Systems, Network Institute, Systems and Network Security |
Jazyk: | angličtina |
Rok vydání: | 2013 |
Předmět: | |
Zdroj: | Andriesse, D, Rossow, C, Stone-Gross, B, Plohmann, D & Bos, H 2013, Highly resilient peer-to-peer botnets are here : An analysis of Gameover Zeus . in 2013 8th International Conference on Malicious and Unwanted Software [Proceedings] : "The Americas", MALWARE 2013 ., 6703693, ACM, IEEE Computer Society, Fajardo, Puerto Rico, USA, pp. 116-123, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013, Fajardo, PR, United States, 22/10/13 . https://doi.org/10.1109/MALWARE.2013.6703693 2013 8th International Conference on Malicious and Unwanted Software [Proceedings]: "The Americas", MALWARE 2013, 116-123 STARTPAGE=116;ENDPAGE=123;TITLE=2013 8th International Conference on Malicious and Unwanted Software [Proceedings] MALWARE |
DOI: | 10.1109/MALWARE.2013.6703693 |
Popis: | Zeus is a family of credential-stealing trojans which originally appeared in 2007. The first two variants of Zeus are based on centralized command servers. These command servers are now routinely tracked and blocked by the security community. In an apparent effort to withstand these routine countermeasures, the second version of Zeus was forked into a peer-to-peer variant in September 2011. Compared to earlier versions of Zeus, this peer-to-peer variant is fundamentally more difficult to disable. Through a detailed analysis of this new Zeus variant, we demonstrate the high resilience of state of the art peer-to-peer botnets in general, and of peer-to-peer Zeus in particular. |
Databáze: | OpenAIRE |
Externí odkaz: |