DocumentCode :
2332404
Title :
How to steal a botnet and what can happen when you do
Author :
Kemmerer, Richard A.
Author_Institution :
Comput. Sci. Dept., Univ. of California, Santa Barbara, Santa Barbara, CA, USA
fYear :
2011
fDate :
25-30 Sept. 2011
Firstpage :
1
Lastpage :
1
Abstract :
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
Keywords :
Internet; computer network security; invasive software; Internet; harvest sensitive information; malware infected machines; security threats;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Maintenance (ICSM), 2011 27th IEEE International Conference on
Conference_Location :
Williamsburg, VI
ISSN :
1063-6773
Print_ISBN :
978-1-4577-0663-9
Electronic_ISBN :
1063-6773
Type :
conf
DOI :
10.1109/ICSM.2011.6080765
Filename :
6080765
Link To Document :
بازگشت