Malware Detection From The Network Perspective Using NetFlow Data
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F10%3A00040920" target="_blank" >RIV/00216224:14610/10:00040920 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Malware Detection From The Network Perspective Using NetFlow Data
Original language description
We introduce a new botnet that we have discovered using NetFlow data at the end of 2009. Upon a botnet discovery we designed and implemented plug-in for NfSen collector to help further botnet detection. We will describe plug-in architecture and particular methods for the botnet activity discovery based on NetFlow data. Their combination allows an efficient detection of the Chuck Norris botnet.
Czech name
—
Czech description
—
Classification
Type
A - Audiovisual production
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/OVMASUN200801" target="_blank" >OVMASUN200801: Security of Czech army information and communication systems - On-line monitoring, Visualization and Packet Filtration. Computer Incident Response Capability Development in the Cyber Defence Environment.</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2010
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
ISBN
—
Place of publication
—
Publisher/client name
—
Version
—
Carrier ID
—