Back to Results
First PageMeta Content
Internet protocols / Block cipher modes of operation / Botnet / Malware / RC4 / Transmission Control Protocol / Internet security / Password authentication protocol / Transport Layer Security / Cryptography / Computing / Computer network security


P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany
Add to Reading List

Document Date: 2013-04-16 08:32:23


Open Document

File Size: 637,40 KB

Share Result on Facebook

Country

Germany / /

/

Facility

The Network Institute / Friedrich-Alexander University / Germany ‡VU University / We store / University of Applied Sciences Gelsenkirchen / /

IndustryTerm

carrier protocols / carrier protocol layer / intrusion detection systems / carrier-protocol-specific signatures / encryption algorithms / decryption algorithm / legitimate network / obfuscation algorithms / line speed networks / Internet users / malware using non-descriptive carrier protocols / carrier protocol / direct Internet connection / encryption algorithm / /

OperatingSystem

Microsoft Windows / /

Organization

Encrypted Command / Institute for Internet Security / University of Applied Sciences Gelsenkirchen / Department of Computer Science / Germany ‡VU University Amsterdam / Friedrich-Alexander University / Federal Ministry of Education / Network Institute / /

Person

Christian J. Dietrich / /

Position

engineer / /

SportsEvent

epl / /

Technology

encryption / C&C encryption / carrier protocol / carrier protocols / C&C protocols / C&C protocol / certain C&C protocol / encryption algorithms / Palevo C&C encryption / DNS / Zeus P2P C&C encryption / analyzed C&C protocols / 2.2 Encryption / using encryption algorithms / P2P / malware using non-descriptive carrier protocols / malware-specific C&C protocol / HTTP / 4-Gram Encryption / binary C&C protocols / evasive C&C protocols / C&C carrier protocols / XOR-based algorithms / obfuscation algorithms / gigabit / C&C encryption algorithms / underlying protocol / UDP / decryption algorithm / XOR-based encryption / little-endian / few encrypted C&C protocols / XOR-based encryption algorithm / /

SocialTag