icon-carat-right menu search cmu-wordmark

A Case Study - Using Flow to Identify Specific Malware Characteristics

Presentation
In this presentation, US-CERT staff explain how they narrowed a large dataset to a few suspicious IP addresses using SiLK and PERL.
Publisher

Software Engineering Institute

Abstract

In this presentation, given at FloCon 2010, US-CERT staff explain how they narrowed a large dataset to a few suspicious IP addresses using SiLK and PERL.

Part of a Collection

FloCon 2010 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.