[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ormerod, 2012 - Google Patents

An Analysis of a Botnet Toolkit and a Framework for a Defamation Attack

Ormerod, 2012

View PDF
Document ID
14718160654885957043
Author
Ormerod T
Publication year

External Links

Snippet

Zeus is a prevalent malware toolkit purchased with the intent of creating a Zeus botnet. It is a favourite tool of hackers and presents an interesting challenge to analyze. In this Chapter, we present a case study on an analysis of Zeus through reverse engineering. The purpose …
Continue reading at spectrum.library.concordia.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Tekiner et al. SoK: cryptojacking malware
Dargahi et al. A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
Sood et al. An empirical study of HTTP-based financial botnets
Keshavarzi et al. I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion
Sood et al. Dissecting SpyEye–Understanding the design of third generation botnets
Zimba et al. Recent advances in cryptovirology: State-of-the-art crypto mining and crypto ransomware attacks
Kadir et al. Understanding android financial malware attacks: Taxonomy, characterization, and challenges
Emigh The crimeware landscape: Malware, phishing, identity theft and beyond
Yadav et al. A review on malware analysis for iot and android system
Sharif Web attacks analysis and mitigation techniques
Herr et al. Milware: Identification and implications of state authored malicious software
Belous et al. Computer viruses, malicious logic, and spyware
Murimi Use of Botnets for mining cryptocurrencies
Riccardi et al. Taming Zeus by leveraging its own crypto internals
Sood et al. Exploiting trust: stealthy attacks through socioware and insider threats
Indu et al. Ransomware: A New Era of Digital Terrorism
Ormerod An Analysis of a Botnet Toolkit and a Framework for a Defamation Attack
Narain Ransomware-Rising Menace to an Unsuspecting Cyber Audience
Singh et al. A survey on Malware, Botnets and their detection
Vilà Identifying and combating cyber-threats in the field of online banking.
Alexander Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study
Aguilà Vilà Identifying and combating cyber-threats in the field of online banking
Perez Analysis and Detection of the Silent Thieves
Pescatore Using hardware-enabled trusted crypto to thwart advanced threats
Scheau et al. Cyberattack-risk factor for financial transactions