Abstract | ||
---|---|---|
Botnets, networks of malware-infected machines (bots) that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program designed to harvest sensitive information (such as bank account and credit-card data) from its victims. In this article, the authors report on their efforts to take control of the Torpig botnet and study its operations for a period of 10 days. During this time, they observed more than 180,000 infections and recorded almost 70 Gbytes of data that the bots collected. They also report on what happened in the year that has passed since they lost control of the Torpig botnet. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/MSP.2010.144 | Security & Privacy, IEEE |
Keywords | Field | DocType |
Internet,computer network security,invasive software,Internet,Torpig,botnet,malware infected machine network,botnets,malware,malware analysis | Cutwail botnet,Internet privacy,Rustock botnet,Computer science,Botnet,Computer security,Srizbi botnet,Asprox botnet,Malware,Malware analysis,Mariposa botnet | Journal |
Volume | Issue | ISSN |
9 | 1 | 1540-7993 |
Citations | PageRank | References |
28 | 1.34 | 36 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Brett Stone-Gross | 1 | 521 | 28.74 |
CovaMarco | 2 | 28 | 1.34 |
Gilbert, B. | 3 | 35 | 2.14 |
KemmererRichard | 4 | 28 | 1.34 |
Christopher Kruegel | 5 | 8799 | 516.05 |
Giovanni Vigna | 6 | 7121 | 507.72 |