DocumentCode
2332404
Title
How to steal a botnet and what can happen when you do
Author
Kemmerer, Richard A.
Author_Institution
Comput. Sci. Dept., Univ. of California, Santa Barbara, Santa Barbara, CA, USA
fYear
2011
fDate
25-30 Sept. 2011
Firstpage
1
Lastpage
1
Abstract
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
Keywords
Internet; computer network security; invasive software; Internet; harvest sensitive information; malware infected machines; security threats;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Maintenance (ICSM), 2011 27th IEEE International Conference on
Conference_Location
Williamsburg, VI
ISSN
1063-6773
Print_ISBN
978-1-4577-0663-9
Electronic_ISBN
1063-6773
Type
conf
DOI
10.1109/ICSM.2011.6080765
Filename
6080765
Link To Document