Ormerod, 2012 - Google Patents
An Analysis of a Botnet Toolkit and a Framework for a Defamation AttackOrmerod, 2012
View PDF- Document ID
- 14718160654885957043
- Author
- Ormerod T
- Publication year
External Links
Snippet
Zeus is a prevalent malware toolkit purchased with the intent of creating a Zeus botnet. It is a favourite tool of hackers and presents an interesting challenge to analyze. In this Chapter, we present a case study on an analysis of Zeus through reverse engineering. The purpose …
- 238000004458 analytical method 0 title abstract description 75
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tekiner et al. | SoK: cryptojacking malware | |
Dargahi et al. | A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | |
Sood et al. | An empirical study of HTTP-based financial botnets | |
Keshavarzi et al. | I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion | |
Sood et al. | Dissecting SpyEye–Understanding the design of third generation botnets | |
Zimba et al. | Recent advances in cryptovirology: State-of-the-art crypto mining and crypto ransomware attacks | |
Kadir et al. | Understanding android financial malware attacks: Taxonomy, characterization, and challenges | |
Emigh | The crimeware landscape: Malware, phishing, identity theft and beyond | |
Yadav et al. | A review on malware analysis for iot and android system | |
Sharif | Web attacks analysis and mitigation techniques | |
Herr et al. | Milware: Identification and implications of state authored malicious software | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
Murimi | Use of Botnets for mining cryptocurrencies | |
Riccardi et al. | Taming Zeus by leveraging its own crypto internals | |
Sood et al. | Exploiting trust: stealthy attacks through socioware and insider threats | |
Indu et al. | Ransomware: A New Era of Digital Terrorism | |
Ormerod | An Analysis of a Botnet Toolkit and a Framework for a Defamation Attack | |
Narain | Ransomware-Rising Menace to an Unsuspecting Cyber Audience | |
Singh et al. | A survey on Malware, Botnets and their detection | |
Vilà | Identifying and combating cyber-threats in the field of online banking. | |
Alexander | Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study | |
Aguilà Vilà | Identifying and combating cyber-threats in the field of online banking | |
Perez | Analysis and Detection of the Silent Thieves | |
Pescatore | Using hardware-enabled trusted crypto to thwart advanced threats | |
Scheau et al. | Cyberattack-risk factor for financial transactions |