Botconf presentation or article

Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environment

Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environment Botconf 2013 Friday | 09:00 – 09:30 Julien Lavesque 🗣 | Hervé Luga | Meriam Mahjoub | Sébastien Aucouturier | Christophe Bisière | Jean-Nicolas Piotrowski Edit PDF Video

Perdix: a framework for realtime behavioral evaluation of security threats in cloud computing environment Read More »

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Botconf 2013 Friday | 09:30 – 10:00 Pasquale Stirparo 🗣 | Laurent Beslay 🗣 Due to the substantially different ecosystem we have to deal with when it comes to mobile security, it makes it harder to detect and react to malware attacks if using conventional techniques.

Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Read More »

Reputation-based Life-course Trajectories of Illicit Forum Members

Reputation-based Life-course Trajectories of Illicit Forum Members Botconf 2013 Friday | 11:20 – 11:50 David Décary-Hétu 🗣 The Internet has become over the past fifteen years the medium of choice for people to communicate with each other. As Boase & Wellman (2002) have predicted, we are now firmly in the era of networked individualism where

Reputation-based Life-course Trajectories of Illicit Forum Members Read More »

Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnets

Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnets Botconf 2013 Thursday | 09:40 – 10:10 Ulrich Seldeslachts 🗣 Edit PDF Video

Preliminary results from the European antibotnet pilot action ACDC. Integrating industry, research and operational networks into detecting and mitigating botnets Read More »

Advanced Techniques in Modern Banking Trojans

Advanced Techniques in Modern Banking Trojans Botconf 2013 Thursday | 10:10 – 10:50 Thomas Siebert 🗣 Banking Trojans are proven to be a successful cybercrime business model. However, the creation of URL blacklists heavily affected the cybercrime operations. This talk shows new command-and-control methods the cybercriminals have implemented to avoid blacklists. Another challenge for banking

Advanced Techniques in Modern Banking Trojans Read More »

Distributed Malware Proxy Networks

Distributed Malware Proxy Networks Botconf 2013 Thursday | 11:30 – 12:10 Brad Porter 🗣 | Nick Summerlin This presentation discusses several existing proxy networks used in malware campaigns and our efforts to track them in an automated fashion. Criminals are increasingly turning to proxy networks to provide an additional layer of protection between their adversaries (law enforcement

Distributed Malware Proxy Networks Read More »

Legal limits of proactive actions: Coreflood botnet example

Legal limits of proactive actions: Coreflood botnet example Botconf 2013 Thursday | 13:00 – 13:20 Oğuz Kaan Pehlivan 🗣 Passive defense mechanisms are necessary component of well-designed cyber defense programs but they are no longer sufficient to address increasingly sophisticated threats. Thus, addressing the threats more comprehensively may require additional mechanisms. So, active cyber defense

Legal limits of proactive actions: Coreflood botnet example Read More »

Scroll to Top