Tracking botnets using automatically generated domains
by Mirko Zorz - Friday, 15 November 2013.
Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security.

Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures that are difficult to track or deactivate. Considerable attention has been given to recognizing automatically generated domains (AGDs) from DNS traffic, in order to identify previously unknown AGDs, which helps in the task of disrupting botnetsí communication capabilities.

In this podcast recorded at the Hack In The Box 2013 conference in Kuala Lumpur, Zanero talks about his recent research that centered on identifying a new method to gather intelligence from passive DNS data, a source easily available to researchers.

Press the play button below to listen to the podcast:

Spotlight

Infographic: 25 years of the firewall

Posted on 24 July 2014.  |  The firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. If you take a moment to scan the infographic, youíll notice the firewall's introduction and evolution coincide with certain security events.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Jul 25th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //