<node id="423671">
  <nid>423671</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1436519565</created>
  <changed>1475892746</changed>
  <title><![CDATA[PhD Defense by Yacin Nadji]]></title>
  <body><![CDATA[<p>Ph.D. Thesis Defense&nbsp;</p><p>&nbsp;</p><p>Title: Understanding DNS-based Criminal Infrastructure for Informing Takedowns</p><p>&nbsp;</p><p>Yacin Nadji</p><p>School of Computer Science</p><p>Georgia Institute of Technology</p><p>&nbsp;</p><p>Date: Wednesday, July 15, 2015</p><p>Time: 10:00 am</p><p>Location: KACB Room 3126</p><p>&nbsp;</p><p>Committee</p><p>----------------</p><p>Prof. Wenke Lee (Co-advisor, School of Computer Science, Georgia Institute of Technology)</p><p>Prof. Emmanouil Antonakakis (Co-advisor, School of Electrical and Computer Engineering, Georgia Institute of Technology)</p><p>Prof. Douglas Blough (School of Electrical and Computer Engineering, Georgia Institute of Technology)</p><p>Prof. Mustaque Ahamad (School of Computer Science, Georgia Institute of Technology)</p><p>Prof. Michael Bailey (Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign)</p><p>&nbsp;</p><p>Abstract</p><p>--------------</p><p>Botnets are a pervasive threat to the Internet and its inhabitants. A botnet is a collection</p><p>of infected machines that receive commands from the botmaster, a person, group or nation-</p><p>state, to perform malicious actions. Instead of "cleaning" individual infections, one can sever</p><p>the method of communication between a botmaster and her zombies by attempting a botnet</p><p>takedown, which contains the botnet and its malicious actions.</p><p>&nbsp;</p><p>Unfortunately, takedowns are currently performed without technical rigor nor are there</p><p>automated and independent means to measure success or assist in performing them. Our</p><p>research focuses on understanding the criminal infrastructure that enables communication</p><p>between a botmaster and her zombies in order to measure attempts at, and to perform,</p><p>successful takedowns. We show that by interrogating malware and performing large-scale</p><p>analysis of passively collected network data, we can measure if a past botnet takedown was</p><p>successful and use the same techniques to perform more comprehensive takedowns in the</p><p>future.</p><p> </p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Understanding DNS-based Criminal Infrastructure for Informing Takedowns]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2015-07-15T11:00:00-04:00]]></value>
      <value2><![CDATA[2015-07-15T13:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
