• DocumentCode
    3349029
  • Title

    The waledac protocol: The how and why

  • Author

    Sinclair, Greg ; Nunnery, Chris ; Kang, Brent ByungHoon

  • Author_Institution
    iDefense, Univ. of North Carolina at Charlotte, Charlotte, NC, USA
  • fYear
    2009
  • fDate
    13-14 Oct. 2009
  • Firstpage
    69
  • Lastpage
    77
  • Abstract
    Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others.
  • Keywords
    invasive software; peer-to-peer computing; protocols; P2P architecture; Waledac protocol; malware community; peer to peer botnets; Command and control systems; Information security; Network topology; Peer to peer computing; Protection; Protocols; Robustness; Storms;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
  • Conference_Location
    Montreal, QC
  • Print_ISBN
    978-1-4244-5786-1
  • Type

    conf

  • DOI
    10.1109/MALWARE.2009.5403015
  • Filename
    5403015