DocumentCode
3349029
Title
The waledac protocol: The how and why
Author
Sinclair, Greg ; Nunnery, Chris ; Kang, Brent ByungHoon
Author_Institution
iDefense, Univ. of North Carolina at Charlotte, Charlotte, NC, USA
fYear
2009
fDate
13-14 Oct. 2009
Firstpage
69
Lastpage
77
Abstract
Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others.
Keywords
invasive software; peer-to-peer computing; protocols; P2P architecture; Waledac protocol; malware community; peer to peer botnets; Command and control systems; Information security; Network topology; Peer to peer computing; Protection; Protocols; Robustness; Storms;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
Conference_Location
Montreal, QC
Print_ISBN
978-1-4244-5786-1
Type
conf
DOI
10.1109/MALWARE.2009.5403015
Filename
5403015
Link To Document