<--- Back to Details
First PageDocument Content
Spamming / Computer network security / Multi-agent systems / Domain name system / Botnets / Command and control / Rustock botnet / Name server / Email spam / OpenDNS / DNS sinkhole
Date: 2015-10-20 13:20:24
Spamming
Computer network security
Multi-agent systems
Domain name system
Botnets
Command and control
Rustock botnet
Name server
Email spam
OpenDNS
DNS sinkhole

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Download Document from Source Website

File Size: 194,18 KB

Share Document on Facebook

Similar Documents

Benefit Matrix Package Comparison  Choose the package that meets your needs PRODUCT BENEFITS

Benefit Matrix Package Comparison Choose the package that meets your needs PRODUCT BENEFITS

DocID: 1u1Hv - View Document

Solution Brief  Waste Less Time Fighting Ransomware Attacks “DOES OPENDNS BLOCK RANSOMWARE?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider —

Solution Brief Waste Less Time Fighting Ransomware Attacks “DOES OPENDNS BLOCK RANSOMWARE?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider —

DocID: 1t1Jn - View Document

Datasheet:  The OpenDNS Channel Program A new source of annual recurring revenue for your business with security products that are designed for the way the world works today. OpenDNS is excited to offer an exclusive chan

Datasheet: The OpenDNS Channel Program A new source of annual recurring revenue for your business with security products that are designed for the way the world works today. OpenDNS is excited to offer an exclusive chan

DocID: 1ssDM - View Document

Characterizing IPv4 Anycast Adoption and Deployment Danilo Cicalese Jordan Augé

Characterizing IPv4 Anycast Adoption and Deployment Danilo Cicalese Jordan Augé

DocID: 1qz0D - View Document

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1  Institute for In

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

DocID: 1pss6 - View Document