Title :
The waledac protocol: The how and why
Author :
Sinclair, Greg ; Nunnery, Chris ; Kang, Brent ByungHoon
Author_Institution :
iDefense, Univ. of North Carolina at Charlotte, Charlotte, NC, USA
Abstract :
Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to enumerate. This paper explains the various aspects of the Waledac botnet infrastructures to give defenders a better understanding of the botnet in order to protect themselves and others.
Keywords :
invasive software; peer-to-peer computing; protocols; P2P architecture; Waledac protocol; malware community; peer to peer botnets; Command and control systems; Information security; Network topology; Peer to peer computing; Protection; Protocols; Robustness; Storms;
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-5786-1
DOI :
10.1109/MALWARE.2009.5403015