Frederic Dahl’s research while affiliated with University of Mannheim and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1: Keys generated by Storm in order to find other infected peers within the network (October 14-18, 2007) 
Figure 4: Search activity in Stormnet. 
Figure 5: Publish activity (distinct IP addresses and rendez-vous hashes) in Stormnet. 
Figure 6: The number of publications by Storm bots vs. the number of publications by our pollution attack. 
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
  • Conference Paper
  • Full-text available

January 2008

·

258 Reads

·

406 Citations

·

Moritz Steiner

·

Frederic Dahl

·

[...]

·

Felix C. Freiling

Botnets, i.e., networks of compromised machines under a com- mon control infrastructure, are commonly controlled by an at- tacker with the help of a central server: all compromised ma- chines connect to the central server and wait for commands. However, the first botnets that use peer-to-peer (P2P) net- works for remote control of the compromised machines ap- peared in the wild recently. In this paper, we introduce a methodology to analyze and mitigate P2P botnets. In a case study, we examine in detail the Storm Worm botnet, the most wide-spread P2P botnet currently propagating in the wild. We were able to infiltrate and analyze in-depth the botnet, which al- lows us to estimate the total number of compromised machines. Furthermore, we present two different ways to disrupt the com- munication channel between controller and compromised ma- chines in order to mitigate the botnet and evaluate the effective- ness of these mechanisms.

Download

Citations (1)


... • Security Awareness and Training: Educating users about the risks of botnets and safe practices to avoid infection [14]. • Regular Updates and Patch Management: Keeping software and systems updated to patch vulnerabilities that could be exploited by botnets [20]. • Antivirus and Antimalware Solutions: Deploying comprehensive security solutions that can detect and block botnet-related malware [30]. ...

Reference:

Botnet Detection and Mitigation: A Comprehensive Literature Review
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm