Ph.D Thesis Proposal by Yacin Nadji

Event Details
  • Date/Time:
    • Thursday March 5, 2015
      9:00 am - 11:00 am
  • Location: KACB Room 3126
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Understanding DNS-based Criminal Infrastructure to Perform Takedowns

Full Summary: No summary paragraph submitted.

Ph.D. Thesis Proposal 

 

Title: Understanding DNS-based Criminal Infrastructure to Perform Takedowns

 

Yacin Nadji

School of Computer Science

Georgia Institute of Technology

 

Date: Thursday, March 5, 2015

Time: 10:00 am

Location: KACB Room 3126

 

Committee

----------------

Prof. Wenke Lee (Co-advisor, School of Computer Science, Georgia Institute of Technology)

Prof. Emmanouil Antonakakis (Co-advisor, School of Electrical and Computer Engineering, Georgia Institute of Technology)Prof. Douglas Blough (School of Electrical and Computer Engineering, Georgia Institute of Technology)Prof. Mustaque Ahamad (School of Computer Science, Georgia Institute of Technology)Prof. Michael Bailey (Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign)

 

Abstract

--------------

Botnets are a pervasive threat to the Internet and its inhabitants. A botnet is a collectionof infected machines that receive commands from the botmaster, a person, group or nation-state, to perform malicious actions. Instead of "cleaning" individual infections, one can severthe method of communication between a botmaster and her zombies by attempting a botnettakedown, which contains the botnet and its malicious actions. Unfortunately, takedowns are currently performed without technical rigor nor are thereautomated and independent means to measure success or assist in performing them. Ourresearch focuses on understanding the criminal infrastructure that enables communicationbetween a botmaster and her zombies in order to measure attempts at, and to perform,successful takedowns. We show that by interrogating malware and performing large-scaleanalysis of passively collected network data, we can measure if a past botnet takedown wassuccessful and use the same techniques to perform m

Additional Information

In Campus Calendar
No
Groups

Graduate Studies

Invited Audience
Public
Categories
Conference/Symposium
Keywords
graduate students, PhD, proposal defense
Status
  • Created By: Tatianna Richardson
  • Workflow Status: Published
  • Created On: Mar 9, 2015 - 5:48am
  • Last Updated: Oct 7, 2016 - 9:48pm