Tracking botnets using automatically generated domains
by Mirko Zorz - Friday, 15 November 2013.
Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security.

Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures that are difficult to track or deactivate. Considerable attention has been given to recognizing automatically generated domains (AGDs) from DNS traffic, in order to identify previously unknown AGDs, which helps in the task of disrupting botnetsí communication capabilities.

In this podcast recorded at the Hack In The Box 2013 conference in Kuala Lumpur, Zanero talks about his recent research that centered on identifying a new method to gather intelligence from passive DNS data, a source easily available to researchers.

Press the play button below to listen to the podcast:

Spotlight

Leveraging network intelligence and deep packet inspection

Posted on 26 November 2014.  |  Tomer Saban, CEO of WireX Systems, talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Nov 27th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //