Title :
[Copyright notice]
Abstract :
The following topics are dealt with: Botnets; command and control; DNS; URL-based stealthy messaging; adaptive covert communication detection; HTTP requests; IRILD; information retrieval based method; information leak detection; MELISSA; automated undesirable user action detection; critical infrastructures; remote control; smart meters; antisocial spam behavior; location privacy; user-centric threat analysis; distributed denial-of-service attacks; application-defense methods; network-defense methods; CAPTCHuring automated smartphone attacks; and wireless sensor network security.
Keywords :
command and control systems; computer network security; critical infrastructures; electronic messaging; hypermedia; information retrieval; mobile computing; smart phones; telecontrol; unsolicited e-mail; wireless sensor networks; Botnets; CAPTCHuring automated smartphone attacks; DNS; HTTP requests; IRILD; MELISSA; URL-based stealthy messaging; adaptive covert communication detection; antisocial spam behavior; application-defense methods; automated undesirable user action detection; command and control; critical infrastructures; distributed denial-of-service attacks; information leak detection; information retrieval based method; location privacy; network-defense methods; remote control; smart meters; user-centric threat analysis; wireless sensor network security;
Conference_Titel :
Computer Network Defense (EC2ND), 2011 Seventh European Conference on
Conference_Location :
Gothenburg
Print_ISBN :
978-1-4673-2116-7
DOI :
10.1109/EC2ND.2011.3