|
Michael Cooney reporting in NetworkWorld: “Security researchers this week will detail a prototype system they say can better detect so-called Domain Name Generation- (DGA) based botnets such as Conficker and Kraken without the usual labor- and time-intensive reverse-engineering required to find and defeat such malware. The detection system, called Pleiades, monitors traffic below the local DNS server and analyzes streams of unsuccessful DNS resolutions…”
Related Links:
Prototype system goes after DNS-based botnets NetworkWorld
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware USENIX
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byWhoisXML API