Back to Results
First PageMeta Content
Computing / Malware / Spamming / Denial-of-service attack / Botnet / Fast flux / Threat / Zero-day attack / Evasion / Computer network security / Cyberwarfare / Computer security


Command & Control Understanding, Denying and Detecting Joseph Gardiner Marco Cova Shishir Nagaraja February 2014
Add to Reading List

Document Date: 2014-08-07 05:51:59


Open Document

File Size: 603,37 KB

Share Result on Facebook

Company

the New York Times / Online Social Networks / Symantec Symantec / Lastline Inc. / Google / Mandiant Report Mandiant / The Times / Verizon / Kaspersky / the Washington Post / Bloomberg / Bit9 / /

Country

Iran / United States / United Kingdom / China / Israel / /

Facility

JavaScript University of Birmingham / University of Birmingham / /

IndustryTerm

remote access tools / malware analysis tools / transportation / Anti-virus software / defence systems / dynamic analysis tools / intrusion detection systems / enforcement devices / defensive tool / weapons systems / finance insurance / attack tools / transportation control systems / social media websites / finance / manufacturing designs / oil / malicious web page / unused communications mechanisms / energy / missile systems / real estate / internal devices / defence tools / dynamic analysis systems / energy/utilities / software releases / malicious web site / telecommunications / defensive tools / malicious infrastructure / Internet security / computer software / reputation systems / social networks / anonymisation networks / incident management products / law enforcement / media / security tools / whitelisting product / response infrastructure / /

NaturalFeature

Control channel / /

Organization

Pentagon / Control Problem C.2 Command / UK Cabinet Office / Control Problem Command / University of Birmingham / CPNI.gov.uk Initial Compromise Command / Defence Science Board / uk Initial Compromise Command / /

Person

Joseph Gardiner Marco Cova Shishir Nagaraja / /

Position

gov. uk PAGE / cashier / gov. uk actual attack code / passive DNS collector / C2 activity Architect / Governor / gov. uk step / Executive / representative / computer programmer for the development / gov. uk Establish traffic baselines / /

ProgrammingLanguage

JavaScript / /

PublishedMedium

The Times / the New York Times / the Washington Post / /

Technology

P2P protocols / virtual machine / HTTP protocols / Anti-virus software / DNS / firewall / /

SocialTag