Learn Backend Development Part-Time, Online
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the intricacies of botnet defense in this 31-minute Black Hat conference talk. Delve into the world of peer-to-peer botnets, focusing on the Sality P2P Botnet as a case study. Learn about the terminology, takedown methods, and background concepts such as crawlers, sensors, and computational trust. Examine the "Hello" messages used in Sality and understand the objectives of botnet monitoring. Analyze experimental results from single-sensor, multi-sensor, and colluding sensor setups. Gain insights into the ongoing cat-and-mouse game between cyber-security researchers and botnet operators, and discover how trust mechanisms can be leveraged in botnet architectures.
Syllabus
Intro
Introduction #1
Terminology #1
Terminology #28
How can P2P botnets be taken down?
Background: crawlers & sensors
Background: Computational Trust
Background: the Sality P2P Botnet
Background: Sality "Hello" messages
Meet our Botnet
Experiments: objectives of monitoring
Experiments: setup
Experiments: Results - single-sensor
Experiments: Results - multi-sensor (10)
Experiments: Results - colluding sensors
Conclusion
Taught by
Black Hat