icon-carat-right menu search cmu-wordmark

Detecting Malware P2P Traffic Using Network Flow and DNS Analysis

Presentation
In this presentation, John Jerrim discusses Malware that uses P2P protocols for command and control, and describes a tool for detecting/classifying P2P traffic.
Publisher

Software Engineering Institute

Abstract

In this presentation, John Jerrim discusses Malware that uses P2P protocols for command and control, and describes a tool for detecting/classifying P2P traffic.

Part of a Collection

FloCon 2013 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.