A Case Study - Using Flow to Identify Specific Malware Characteristics
• Presentation
In this presentation, US-CERT staff explain how they narrowed a large dataset to a few suspicious IP addresses using SiLK and PERL.
Publisher
Software Engineering Institute
Topic or Tag
Part of a Collection
FloCon 2010 Collection
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.