DocumentCode :
3349029
Title :
The waledac protocol: The how and why
Author :
Sinclair, Greg ; Nunnery, Chris ; Kang, Brent ByungHoon
Author_Institution :
iDefense, Univ. of North Carolina at Charlotte, Charlotte, NC, USA
fYear :
2009
fDate :
13-14 Oct. 2009
Firstpage :
69
Lastpage :
77
Abstract :
Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others.
Keywords :
invasive software; peer-to-peer computing; protocols; P2P architecture; Waledac protocol; malware community; peer to peer botnets; Command and control systems; Information security; Network topology; Peer to peer computing; Protection; Protocols; Robustness; Storms;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-5786-1
Type :
conf
DOI :
10.1109/MALWARE.2009.5403015
Filename :
5403015
Link To Document :
بازگشت