• DocumentCode
    2332404
  • Title

    How to steal a botnet and what can happen when you do

  • Author

    Kemmerer, Richard A.

  • Author_Institution
    Comput. Sci. Dept., Univ. of California, Santa Barbara, Santa Barbara, CA, USA
  • fYear
    2011
  • fDate
    25-30 Sept. 2011
  • Firstpage
    1
  • Lastpage
    1
  • Abstract
    Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
  • Keywords
    Internet; computer network security; invasive software; Internet; harvest sensitive information; malware infected machines; security threats;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Maintenance (ICSM), 2011 27th IEEE International Conference on
  • Conference_Location
    Williamsburg, VI
  • ISSN
    1063-6773
  • Print_ISBN
    978-1-4577-0663-9
  • Electronic_ISBN
    1063-6773
  • Type

    conf

  • DOI
    10.1109/ICSM.2011.6080765
  • Filename
    6080765