Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Botnet

+ - The Attacker's Trade-Off: Stealth Versus Resilience->

Submitted by
CowboyRobot
CowboyRobot writes "After years of nurturing a botnet from a coding exercise into a powerful tool/weapon, attackers must be careful how they use the botnet so that it's not detected. One fingerpringt that attackers can leave behind comes from usage of domain-generation algorithms (DGA). Detection of this is not difficult and so its usage by attackers shows how serious they are as they balance between strengthening their network and exposing it to detection. Peer-to-peer botnets leave even more distinctive fingerprints and expose themselves even more by frequently connecting to peers. "Attackers focused on cyberespionage and covert operations — known in the defense industry as the "advanced persistent threat," or APT — create stealthy malware that focuses on deniability over dollars.""
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

The Attacker's Trade-Off: Stealth Versus Resilience

Comments Filter:

Money will say more in one moment than the most eloquent lover can in years.

Working...