Nothing Special   »   [go: up one dir, main page]

skip to main content
department
Free access

Inside risks
Reflections on Conficker

Published: 01 October 2009 Publication History

Abstract

An insider's view of the analysis and implications of the Conficker conundrum.

References

[1]
Conficker Working Group Web site (June 2009); http://www.confickerworkinggroup.org
[2]
Giles, J. The inside story of the Conficker worm. New Scientist Journal (June 12, 2009); http://www.newscientist.com/article/mg20227121.500-the-inside-story-of-the-conficker-worm.html?full=true
[3]
Krebs, B. Massive profits fueling rogue antivirus market. The Washington Post (Mar. 16, 2009); http://voices.washingtonpost.com/securityfix/2009/03/obscene_profits_fuel_rogue_ant.html
[4]
Lemos, R. Cabal forms to fight Conficker, offers bounty. Security Focus (Feb. 13, 2009); http://www.securityfocus.com/news/11546
[5]
Markoff, J. The Conficker worm: April Fool's joke or unthinkable disaster? Bits: The New York Times (Mar. 19, 2009); http://bits.blogs.nytimes.com/2009/03/19/the-conficker-worm-april-fools-joke-or-unthinkable-disaster/
[6]
Porras, P.A., Saidi, H., and Yegneswaran, V. Conficker C analysis. SRI International Technical Report (Apr. 4, 2009); http://mtc.sri.com/Conficker/addendumC/#SecurityProductDisablement
[7]
Williams, C. Conficker seizes city's hospital network. The Register (U.K.) (Jan. 20,2009); http://www.theregister.co.uk/2009/01/20/sheffield_conficker/

Cited By

View all
  • (2022)Empirical Study of System Resources Abused by IoT AttackersProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3556901(1-13)Online publication date: 10-Oct-2022
  • (2022)DGA-based botnets detection using DNS traffic miningJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2022.03.00134:5(2045-2061)Online publication date: 1-May-2022
  • (2021)Real-Time Detection of Dictionary DGA Network Traffic Using Deep LearningSN Computer Science10.1007/s42979-021-00507-w2:2Online publication date: 22-Feb-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 52, Issue 10
A View of Parallel Computing
October 2009
134 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1562764
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2009
Published in CACM Volume 52, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Department
  • Popular
  • Un-reviewed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)167
  • Downloads (Last 6 weeks)26
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Empirical Study of System Resources Abused by IoT AttackersProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3556901(1-13)Online publication date: 10-Oct-2022
  • (2022)DGA-based botnets detection using DNS traffic miningJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2022.03.00134:5(2045-2061)Online publication date: 1-May-2022
  • (2021)Real-Time Detection of Dictionary DGA Network Traffic Using Deep LearningSN Computer Science10.1007/s42979-021-00507-w2:2Online publication date: 22-Feb-2021
  • (2019)A Survey on the Moving Target Defense Strategies: An Architectural PerspectiveJournal of Computer Science and Technology10.1007/s11390-019-1906-z34:1(207-233)Online publication date: 18-Jan-2019
  • (2017)DBodComputers and Security10.1016/j.cose.2016.10.00164:C(1-15)Online publication date: 1-Jan-2017
  • (2016)DGA Botnet Detection Utilizing Social Network Analysis2016 International Symposium on Computer, Consumer and Control (IS3C)10.1109/IS3C.2016.93(333-336)Online publication date: Jul-2016
  • (2016)MAGMA network behavior classifier for malware trafficComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2016.03.021109:P2(142-156)Online publication date: 9-Nov-2016
  • (2015)Macroscopic view of malware in home networks2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)10.1109/CCNC.2015.7157987(262-266)Online publication date: Jan-2015
  • (2015)Types of Malware and Malware Distribution StrategiesThe Global Cyber-Vulnerability Report10.1007/978-3-319-25760-0_2(33-46)Online publication date: 10-Dec-2015
  • (2012)From throw-away traffic to botsProceedings of the 21st USENIX conference on Security symposium10.5555/2362793.2362817(24-24)Online publication date: 8-Aug-2012
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media