Tracking botnets using automatically generated domains
by Mirko Zorz - Friday, 15 November 2013.
Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security.

Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures that are difficult to track or deactivate. Considerable attention has been given to recognizing automatically generated domains (AGDs) from DNS traffic, in order to identify previously unknown AGDs, which helps in the task of disrupting botnetsí communication capabilities.

In this podcast recorded at the Hack In The Box 2013 conference in Kuala Lumpur, Zanero talks about his recent research that centered on identifying a new method to gather intelligence from passive DNS data, a source easily available to researchers.

Press the play button below to listen to the podcast:

Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //