Skip to main content
King Abdullah University of Science and Technology
Computer Science
CS
Computer Science
  • Study
    • Prospective Students
    • Current Students
  • Research
    • Research Areas
    • Research Groups
  • People
    • All People
    • Faculty
    • Affiliate Faculty
    • Instructional Faculty
    • Research Scientists
    • Research Staff
    • Postdoctoral Fellows
    • Administrative Staff
    • Alumni
    • Students
  • News
  • Events
  • About
  • CEMSE Division
  • Apply

C2C

BGP hijacks: the next generation stealthy Command and Control for botnets

Dr. Marc Dacier, Chair of the Digital Security department and a full Professor at Eurecom, France

Sep 30, 12:00 - 13:00

B9 L2 H1 R2322

botnets C2C malware command and control

Abstract It is well known that malware spreading over the Internet aim at transforming vulnerable devices into bots that can be misused by attackers. These armies of bots constitute what is commonly called "botnets" and they are given tasks (such as spamming, dosing, etc..) to do through a "command and control" infrastructure (C2C). Identifying and neutralizing these C2C has been the subject of an arms race between white and black hats for years. In this talk, we will briefly explain how C2C works and how they have been (and still are being) detected. We will then present some very strange

Computer Science (CS)

Footer

  • A-Z Directory
    • All Content
    • Browse Related Sites
  • Site Management
    • Log in

© 2024 King Abdullah University of Science and Technology. All rights reserved. Privacy Notice