Detecting Malware P2P Traffic Using Network Flow and DNS Analysis
• Presentation
In this presentation, John Jerrim discusses Malware that uses P2P protocols for command and control, and describes a tool for detecting/classifying P2P traffic.
Publisher
Software Engineering Institute
Topic or Tag
Part of a Collection
FloCon 2013 Collection
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.