2012
DOI: 10.1109/tifs.2011.2173486
|View full text |Cite
|
Sign up to set email alerts
|

A Large-Scale Empirical Study of Conficker

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
34
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(37 citation statements)
references
References 10 publications
3
34
0
Order By: Relevance
“…We also list the AS name and home country extracted from whois data. Similar to the Conficker [55] and Mega-D [4] botnets, we see a dominant AS at the top of the list (TTNet), which alone accounts for over 10% all participating bots, followed by a long tail of small ASes. However, although the scale of the leading ASes may resemble other botnets, the networks featured in the top 10 are quite different (Table 4).…”
Section: Botnet Characteristicsmentioning
confidence: 51%
See 1 more Smart Citation
“…We also list the AS name and home country extracted from whois data. Similar to the Conficker [55] and Mega-D [4] botnets, we see a dominant AS at the top of the list (TTNet), which alone accounts for over 10% all participating bots, followed by a long tail of small ASes. However, although the scale of the leading ASes may resemble other botnets, the networks featured in the top 10 are quite different (Table 4).…”
Section: Botnet Characteristicsmentioning
confidence: 51%
“…To this end, we determine the Autonomous System Number (ASN) for each bot using a Routeviews BGP routing snapshot [60] [55], the Mega-D botnet as reported by [4,55], and the Sality (sipscan) botnet. We observe a trend toward Eastern European countries which have not featured as prominently in previous botnets.…”
Section: Botnet Characteristicsmentioning
confidence: 99%
“…Conficker [13], [14] is a computer worm and also a botnet discovered in November 2008. It has up to five variants and it mainly exploits vulnerability in the NetBIOS server service on Windows computers.…”
Section: A Stealthy and Slow-paced Attackmentioning
confidence: 99%
“…The network can be a host based internal network or just some computers that share information via USB drives. Vulnerable computers can be infected with 2 types of malware -known malware and so-called 0-Day malware [4][6] [8]. The distinction here is that Anti-Virus companies have signatures for known malware.…”
Section: Onto Malwarementioning
confidence: 99%
“…Specially crafted exploit code have been developed using python code & shell code for the purpose of proof of concept to exploit the existing vulnerability of buffer overflow inside the application. Propagation of the infected/malicious word document have been done using conventional methods through email [4][6], hyper link creation and luring the victims to download the file, spreading and posting the links over social media .…”
Section: ) Microsoft Word Document 2007-buffer Overflow Vulnerabilitmentioning
confidence: 99%