A Review of ZeroAccess peer-to-peer Botnet
|
|
|
- Natalie Nancy Simpson
- 10 years ago
- Views:
Transcription
1 A Review of ZeroAccess peer-to-peer Botnet Ms. Cheenu M.TECH & Graphic Era Hill University Dehradun India Abstract Today ZeroAccess is one of the widespread threats over the internet. The total number of infected systems is in the tens of millions with the number of lively infection. ZeroAccess is a Peer-to-peer botnet that affects Microsoft windows operating systems. It is used to download other malware on an infected machine from a Botnet and works as a platform. ZeroAccess is mostly implicated in bitcoin mining and click fraud, while outstanding hidden on a system using rootkit techniques. In this survey, we will explain the Evolution of ZeroAccess Botnet, the life cycle of ZeroAccess Botnet and concludes what are the challenges in ZeroAccess botnet. Keywords Botnet, ZeroAccess botnet, Command and Control (C&C). I. INTRODUCTION A bot is a malicious software instance that runs automatically on a compromised computer system without the user s permission. Some group of criminals professionally writes the bot program. A group of bots is known as Botnet that are under the control of attacker. A Botnet is collection of compromised computer systems (zombies) receiving and responding to commands from a server that serves as a meeting mechanism for commands from a botmaster. To evade detection, the botmaster can optionally employ a number of proxy machines, called stepping-stone between command and control and itself [1]. Figure 1: Botnet Taxonomy [1] The key feature of botnet is its C&C communication, which is categorized in to three categories: In a centralised architecture of C&C, bots contact the C&C server in order to receive information from the botmaster. Generally, little time is spent in the transmission of a message from the botmaster to all the bots, and this represents one of the major advantages of this architecture. Its disadvantage is the fact that the C&C server constitutes a single point of failure. Thus, if the server shuts down, the complete network is shutdown. Examples of centralised botnets; Eggdrop [2], Gt-Bot and Agobot [3] and Bobax [4]. In a distributed architecture, all the bots in the botnet act simultaneously as servers and clients. This philosophy avoids the existence of a single point of failure, and so this kind of botnet is more resistant than a centralised one. However, the time required for a message to reach all the nodes is much greater than in the centralised case. Example of distributed botnets; Spybot [5], Storm[6], Nugache [7] and Phatbot [8]. Finally, hybrid botnets combine the advantages of the two previous architectures. In this case, there exist one or more distributed networks, each with one or more centralised servers. The disconnection of one of these servers implies, in the worst case, the fall of one of the distributed networks, allowing the rest of the botnet to continue its normal operation. Some examples of hybrid botnets are Torpig [9], Waledac [10] and a new design of botnet proposed by Wang et al. In [11]. More recent and sophisticated hybrid botnets include Alureon/TDL4 [12] and Zeus-P2P. Table 1: Comparison of P2P botnets Botnet Year C&C Architecture Slapper [13] Sep 2002 P2P Spybot [5] Apr 2003 Decentralized Sinit [14] Sep 2003 Decentralized,P2P Nugache [7] Apr 2006 Decentralized,Custom Phatbot [8] Sep 2004 WASTE- P2P Minor botnet [15] Dec 2010 Centralized and distributed, P2P Kelihos [16] Dec 2010 Decentralized,P2P ZeroAccess [17] Sep 2011 Decentralized, P2P TDL-4 [12] 2011 Kad network THOR Mar 2012 Decentralized ZeroAccess (ZA) is one of the peer-to-peer s. It is also known as max++, Sirefef [17] and a Trojan malware that ISSN: Page 60
2 affects windows operating systems. ZeroAccess infected machine will be connected to the P2P network and download plugins and other malwares from a Botmaster. It is mostly implicated in Bitcoin mining and click-fraud, while outstanding unseen on a system using rootkit techniques. The size of zeroaccess botnet is approximately 10 s of million infected computers with the number of active infection [18]. It utilizes a peer-to-peer (P2P) mechanism for communication [19]. It is used to make money for the botmaster through click fraud (pay-per-click (PPC) advertising) and bitcoin mining. II. EVOLUTION OF ZEROACCESS BOTNET There are two different versions of ZeroAccess: Old version (V1) and new version (V2). Each version of botnet has 32-bit and 64-bit version. It means there are four total number of botnet. The old version (V1) of ZA discovered in May 2011[17]. The new version (V2) of ZA with various modification saw a major redesign of the Trojan s internals, emerged in the summer of In September, 2013, Zeroaccess V2 is the last modified and most widespread version of the Trojan [20]. Both versions of ZeroAccess communicate with a P2P network on a set of designated ports used to distinguish 32-bit and 64-bit infections. The designated ports for V1 that are used by 32-bit are 21810, 22292, 34354, and used by 64-bit are 21810, The designated port for V2 that are used by 32-bit are 16464, and used by 64-bit are 16470, All communicating with their infected partners, independently of each other. There are following four ZeroAccess variants that have been observed: ZeroAccess V1- Variant I, II, and III ZeroAccess V2- Variant IV These variant have various different characteristics that are described in detail in the following sections: In May 2011, the first variant of ZeroAccess was released. It included a rootkit component that was installed as a kernel driver. Hidden files used by the kernel driver and formatted as an NTFS file system and contains core component of zeroaccess. Variant I also included a tripwire driver, which was used to detect important behavioral features of antivirus scanners. In particular, it would check processes for strangely high access counts to the registry. If a process looked at more than fifty service registry key entries in a short period, the process was suspended [21]. The second variant of ZeroAccess was released in July It also used the rootkit component but modified the way where it covers the core components. It also included tripwire driver. The kernel driver was used the hidden files to allow access. Now these hidden files stored in %Windir%\$KBUnstall [FIVE DIGIT RANDOM NUMBER] $\. After that in 2012, another variant of zeroaccess (Variant III) was released. It also used the rootkit component but modified the way where it covers the core components same as Variant II. It removed tripwire driver. The kernel driver was used the hidden files to allow access. Now these hidden files stored in %Windir%\$KBUnstall [FIVE DIGIT RANDOM NUMBER] $\ same as Variant II. The fourth variant of ZeroAccess was released in July 2012 and underwent overhaul. Attacker was shifted code from the kernel mode to user mode [22]. ZeroAccess had developed and with this evolution came a new communication. In this variant of ZeroAccess, C&C also moved away from TCP and instead favoured UDP a more efficient alternative to TCP for communication. Due to the major change in the design of ZeroAccess became known in the security community as version two (V2) and is referred to as Variant IV in this paper. This is still the most widespread version of ZeroAccess. In V1, P2P communication was through TCP [23]. Since the release of V2, communication has moved to UDP [19]. In V2 s release, the command set was also reduced. Coupled with UDP, this further enhanced the efficiency and resiliency of the communication [24]. Table 2: Difference between V1 and V2 Serial number ZeroAccess Version1 (V1) ZeroAccess Version2 (V2) Year September 2011 April 2012 Command and Control P2P P2P Encryption RC4 XOR Career TCP UDP Size ~30,000 ~10 millions Application Click fraud, Click fraud, mining spamming bitcoin Detection Antivirus, security vendors Memory residence Rootkit, Payload Recycle Bin Port Hardcoded Hardcoded Infection vector Exploit kit, drive by download, and social engineering techniques Antivirus, security vendors Exploit kit, drive by download, and social engineering techniques The modified P2P functionality of ZeroAccess V2 makes its P2P network more flexible and robust against outside manipulation. The newl command of ZeroAccess V2 (2012) is used by ZeroAccess to share directly super nodes IP addresses amongst its peers. When a peer receives, a newl command it adds the built-in IP address within the newl command into its internal peer list. The peer also forwards the newl commands to other peers it knows about, magnifying the message s effect. Due to the newl command and sending it to a ZeroAccess peer, it might be possible to introduce a rascal IP address into an infected internal list of ZeroAccess peer and have that rascal newl command distributed to other ZeroAccess peers. Due to the newl command and small fixed length of internal peer list, some of the botnet are sinkhole [25]. However, the modified P2P ZeroAccess V2 (2013) removed the newl command and allows the botnet to filter out rascal IP address [26]. ISSN: Page 61
3 III. LIFE CYCLE OF ZEROACCESS BOTNET There are following stages of the life cycle of a zeroaccess Botnet indicates how zeroaccess Botnet spreads its infection and propagates: A. Stage one: Conception Conception is the first stage of the life cycle of the zeroaccess botnet or any other botnet. It is important to understand the causes underlying botnet creation, and the common architectures and designs employed. The first stage of the botnet lifecycle can be divided into following three phases: Motivation, Design, and Implementation 1) Motivation: Initially attacker needs a good reason to create a botnet. The motivation of zeroaccess botnet is to make money for the attacker through click fraud (pay-perclick) and bitcoin mining. The Symantec Global Internet Security Threat Report [27] shows a detailed catalogue of prices for botnet services. According to Symantec, the ZeroAccess botnet consists of more than 1.9 million infected computers and is used mainly to perform click fraud and Bitcoin mining in order to generate revenues estimated at tens of millions of dollars per year. Machines involved in Bitcoin mining generate Bitcoins for their controller, the estimated worth of which was estimated at 2.7 million US dollars per year in September 2012 [19]. The machines used for click fraud simulate clicks on website advertisements paid for on a pay per click basis. The estimated profit for this activity may be as high as 100,000 US dollars per day [28], costing advertisers a $900,000 a day in fraudulent clicks [29]. 2) Design: ZeroAccess botnet uses a distributed architecture in which all the bots in the botnet act simultaneously as servers and clients. This philosophy avoids the existence of a single point of failure, and so this kind of botnet is more resistant than a centralised one. However, the time required for a message to reach all the nodes is much greater than in the centralised case. According to Symantec, No C&C server exists for zeroaccess therefore poses a major challenge for anybody to attempting to sinkhole the botnet [20]. Many botnets present a distributed structure, including Spybot, Storm, Nugache, and Phatbot. 3) Implementation: Once the botnet has been conceptually conceived and designed, the last process involved in this stage concerns the implementation of the architecture. This task does not present special characteristics, and can be performed following a traditional software development process. B. Stage two: Recruitment Recruitment is the second stage of zeroaccess botnet. The implemented botnet software must be deployed for operation in a real environment. For this purpose, bots must be recruited; indeed, the botmaster s aim is to recruit as many as possible. Note that this question is not unique to botnets, but is found in many cyber attack techniques. Recruitment is also known as infection or propagation. In ZeroAccess botnet, the bot itself is increase through the ZeroAccess Rootkit through a variety of attack vectors. First infection vector is a form of social engineering, where a user is in no doubt to execute malicious code either by masking it as a legal file, or including it hidden as an additional payload in an executable which announces itself as, for example, bypassing copyright protection (a keygen). A second infection vector utilizes an advertising network in order to have the user click on an advertisement that redirects them to a site hosting the malicious software itself. A third infection vector used is an affiliate scheme where third party persons are paid for installing the Rootkit on a system [23]. The attacker uses an exploit machine to send fake notification to the victim machine using attachment. Victim downloads the attachment and receives fake notification containing malicious URL on its machine by which it gets compromise. Victim machine transmitted to compromised site and then transmitted to malicious site hosting Blackhole exploit kit [30]. Blackhole exploit determines software vulnerability and drops the malware. The fake notification has a malicious URL received on the victim s machine opens a back door and connects to a command and control (C&C) server, which allows the remote attacker access to the victim machine. Figure 2: Total number of infected machine [18] 4) Installation: ZeroAccess selects randomly one of the computer start drivers and restores it with a completely different malware driver, location its length to that of the original driver. The operating system loads the malware driver instead of the original during system startup. The malware driver loads the original driver from its confidential benefit store. The malware reloads the I/O database to exchange places with the original driver so that the original driver works normally. Once active, the driver prevents disk operations at the lowest layers of the storage stack to present a view of the replaced driver so that it appears normal and cannot be detected by scanning the file. The driver registers a Shutdown ISSN: Page 62
4 handler, which will repair the malware components on disk. Even if risk images and registry entries are removed, they are restored during shutdown. Variant III infections are also up to with a malicious shell image [23]. The registry holds an entry similar to; HKEY_CURRENT_USER\Software\Microsoft\Win dows NT\Current Version\Winlogon\ Shell = C:\Documents and Settings\Administrator\Local Settings\Application Data\(any 8-character string)\x There is a picture at the path that is called when a user logs in. The picture is capable of re-infecting the system even if the original risk is determined. Variant IV infections do not contain any kernel components. They are launched from hijacked COM registration entries [19]. For example, HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\ {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} changed from C:\WINDOWS\system32\wbem\wbemess.dll to \\.\ globalroot\systemroot\installer\ {{[RANDOM GUID]}\. HKEY_CURRENT_USER\Software\Classes\clsid\ {42aedc fd-b9a3-0c966feabec1} new key added: %User Profile%\Local Settings\Application Data\{[RANDOM GUID]}\ HKEY_CLASSES_ROOT\clsid\{42aedc fdb9a3-0c966feabec1} new key added: % User Profile%\Local Settings\Application Data\{[RANDOM GUID]}\n. Windows 7 and Vista versions also infect the system service image: %System%\services.exe This file is critical to system operation and cannot be removed without rendering the system unbootable. C. Stage three: Interaction This stage refers to all the interactions performed during the botnet operation, including the orders sent by the attacker, the messages interchanged between nodes, external communications from the attacker to monitor P2P network information, and the communications of nodes with external servers. A computer infected with ZeroAccess works as a client and a server in the peer-to-peer network. The infected computer will connect to a peer-to-peer (P2P) network to spread monetization payloads and circulate active peer IP addresses. These monetization payloads carry out the payload functionality and classically perform tasks such as click fraud and Bitcoin mining. The payload of the whole botnet can be altered by seeding new plug-in files into the P2P network. On the other hand, numerous company and home networks build use of Network Address Translation (NAT) when connecting to the Internet. This results in the local IP address of the computer being different from the IP address that the computer becomes visible to have on the Internet. Devoid of setting exact port forwarding at the firewall or router, inward connections to a ZeroAccess infected computer that is, using NAT to connect to the Internet will not arrive at it. As shown in figure3. Figure 3: Peer-to-peer overview Super nodes connects each other and are connected by normal nodes but normal nodes only connect super nodes and cannot be connected directly to the botmaster whose say what the Botnet does by seeding new files onto super nodes that they manage. Super Nodes do the similar action as Normal Nodes in terms of their operation, but they are also answerable for distributing files and IP addresses throughout the botnet. Devoid of Super Node the peer-to-peer, principle would fail [20]. 5) C&C communication: When a system infected by ZeroAccess, it has two main objective. The first spread IP addresses and second spread files across the network quickly. Initially each node maintains a list of 256 IP addresses is taken from a dropped file that is stored in the ZeroAccess folder. ZeroAccess attempts to reach out to each of the IP addresses in succession in order to establish a connection with a peer, retrieve the latest peer list, and join the network. This is done using three commands; getl, retl, and newl. Table 3: Version 1 and Version 2 supported commands and their description P2P version V1 Comma Details nds getl retl Request for peer list Reply to getl command and Includes the list of 256 pairs that initially holds and a list of files and P2P version V2 Comma Details nds getl retl Request for peer list Reply to getl command. Transmits updated peer list and file metadata information. ISSN: Page 63
5 getf timestamps for each file that it has downloaded. Request to file. Download files and store it under hidden folder. newl Figure 4: C&C Communication Add new peer list. 1. The starts issuing a getl command to the remote peer. 2. The new node then responds with a retl packet, which contains 16 peer IP addresses from new node peers list along with a list of all new node s files that remote node can download. Remote node will add any IP addresses from new node that are newer based on the last contacted timestamp from new node. Remote node may also decide to download files from new node. 3. The New node will transmit a getl+ command to remote (super) node on the normal UDP listening port for the current network (16454, 16455, 16470, or 16471). A getl+ command is the same as a getl command but the difference remote (super) node and new (normal) node. 4. The remote node will respond with a retl+ command to new node. A retl+ command is the same as a retl command but again difference super node and new node. The retl+ command will include 16 peer IP addresses from remote node as well as files that remote node has. New node may replace peers from its list that it received from remote node if they have a lower last contacted timestamp than new node has. New node may also decide to download files from remote node. 5. If new node receives the retl+ response from remote node and since new node originally sent the getl+ command to the normal port for this network, new node knows that remote node is not behind NAT and is likely reachable by other peers. New node checks if remote node s IP address is in its peer list and if not, it is added. In addition, if IP addresses of remote node are not in new node s list, new node will select 16 peers from its list at random. 6. Using the 16 peers selected randomly, new node will send a newl command to those 16 peers with the flag value of the newl command set to eight. 7. Upon receiving the newl command the Random Peer 1 (and any peer that receives the newl commands from new node) will check to see if remote node s IP address is in its list. If remote node s IP address is not in Random Peer1 s IP list, it is added. Again, if IP addresses of the remote node are not in Random Peer1 s list Random Peer 1 will select 16 peers from its list at random. 8. Using the 16 peers selected randomly, Random Peer 1 will send a newl command to those 16 peers with the flag value of the newl command decremented by one from what it received from new node. This newl propagation will continue until the flag s value reaches zero. D. Stage four: Attack execution Once an infected computer has connected to a live peer in the network, it will download monetization or plugin files that carry out the payload functionality of ZeroAccess. These plugin files can be updated at any time and new files can be seeded into the botnet by the attackers. Each files is verified with a 1,024-bit RSA key to prevent a third party seeding the botnet with option files, and each botnet has its own set of plug-ins [19]. There are some monetizations or attacks downloaded by ZeroAccess botnet: 6) Pay per install: Besides the conventional attack vectors, ZeroAccess have also been sold as a service on various underground hacker forums. Originally, ZeroAccess was being sold for US$60,000 for the basic package and up to US$120,000 a year for a more featured version [20]. The customers would be allowed to install their own payload modules on the infected systems. 7) Click fraud: This consists in inducing, by deceit, users to click on online ads or to visit certain websites, and thus either increase third-party website revenues and advertisers budget [31]. The use of botnets makes it possible to simulate the behaviour of millions of legitimate users, and is thus ideal for this kind of attack [32]. Microsoft said that the botnet had been assessment advertisers on Bing, Google Inc and Yahoo Inc an estimated $2.7 million monthly [33]. 8) Bitcoin mining: Bitcoin mining is stands on performing mathematical operations on computing hardware. ISSN: Page 64
6 This action has a direct value to the attacker and a cost to innocent victims. IV. RESEARCH CHALLENGES E. Detection and mitigation ZeroAccess selects randomly one of the computer start drivers and restores it with a completely different malware driver, location its length to that of the original driver. The operating system loads the malware driver instead of the original during system startup. The malware driver loads the original driver from its confidential benefit store. The malware reloads the I/O database to exchange places with the original driver so that the original driver works normally. Once active, the driver prevents disk operations at the lowest layers of the storage stack to present a view of the replaced driver so that it appears normal and cannot be detected by scanning the file. The driver registers a Shutdown handler, which will repair the malware components on disk. Even if risk images and registry entries are removed, they are restored again during shutdown. F. Server takedown ZeroAccess uses P2P C&C communication architecture that gives the botnet a high degree of availability and redundancy. It does not use any central C&C server that pretences a major challenge for anybody attempting to sinkhole the botnet. G. Disruption The modified P2P functionality of ZeroAccess V2 makes its P2P network more flexible and robust against outside manipulation. The newl command of ZeroAccess V2 (2012) is used by ZeroAccess to share directly super nodes IP addresses amongst its peers. When a peer receives, a newl command it adds the built-in IP address within the newl command into its internal peer list. The peer also forwards the newl commands to other peers it knows about, magnifying the message s effect. Due to the newl command and sending it to a ZeroAccess peer, it might be possible to introduce a rascal IP address into an infected internal list of ZeroAccess peer and have that rascal newl command distributed to other ZeroAccess peers. However, the modified P2P ZeroAccess V2 (2013) removed the newl command and allows the botnet to filter out rascal IP address. Therefore, it is difficult to disrupt ZeroAccess botnet. V. CONCLUSIONS ZeroAccess is one of the widespread threats over the internet. The total number of infected systems is in the tens of millions with the number of lively infection. ZeroAccess is a Peer-to-peer botnet that affects Microsoft windows operating systems. It is used to download other malware on an infected machine from a Botnet and works as a platform. ZeroAccess is mostly involved in bitcoin mining and click fraud, while outstanding hidden on a system using rootkit techniques. It used a UDP carrier and port hardcoded into the bot binaries. Currently its C&C communication channel uses only two commands getl and newl. We have concluded research challenges of ZeroAccess botnet from this survey. ACKNOWLEDGMENT I would like to thank my supervisors Mr. Ramesh Singh Rawat, Assistant Professor, Dept. of GEU, Dehradun. I would also like to thanks Mr. Deepak Singh Rana, Assistant Professor, Dept. of GEHU, Dehradun for helpful guidance during the work. REFERENCES [1] S. Khattak, N. Ramay, K. Khan, A. Syed, and S. Khayam, "A Taxonomy of Botnet Behaviour, Detection, and Defense," Communications Surveys & Tutorials, IEEE, vol. PP, pp. 1-27, [2] C. Elliott, "Botnets: To what extent are they a threat to information security?," Information Security Technical Report, vol. 15, pp , [3] L. Jing, X. Yang, G. Kaveh, D. Hongmei, and Z. Jingyuan, "Botnet: classification, attacks, detection, tracing, and preventive measures," EURASIP journal on wireless communications and networking, vol. 2009, [4] J. Stewart, "Bobax trojan analysis," SecureWorks, May, vol. 17, [5] C. Li, W. Jiang, and X. Zou, "Botnet: Survey and case study," in Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on, 2009, pp [6] J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, "Peer-to-peer botnets: Overview and case study," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007, pp [7] S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich, "Analysis of the Storm and Nugache Trojans: P2P is here," USENIX; login, vol. 32, pp , [8] J. Stewart, "Phatbot trojan analysis," Retrieved from Secure Works: secureworks. com/research/threats/phatbot, [9] B. Stone-Gross, M. Cova, B. Gilbert, R. Kemmerer, C. Kruegel, and G. Vigna, "Analysis of a botnet takeover," Security & Privacy, IEEE, vol. 9, pp , [10] G. Sinclair, C. Nunnery, and B.-H. Kang, "The Waledac : The how and why," in Malicious and Unwanted Software (MALWARE), th International Conference on, 2009, pp [11] P. Wang, L. Wu, B. Aslam, and C. C. Zou, "A systematic study on peer-to-peer botnets," in Computer Communications and Networks, ICCCN Proceedings of 18th Internatonal Conference on, 2009, pp [12] E. Rodionov and A. Matrosov, "The evolution of tdl: Conquering x64," ESET, June, [13] I. n. Arce and E. Levy, "An analysis of the slapper worm," Security & Privacy, IEEE, vol. 1, pp , [14] J. Stewart, "Sinit P2P trojan analysis," Web publication. Available at URL: secureworks. com/research/threats/sinit, [15] T. Werner, "The Miner Botnet: Bitcoin Mining Goes Peer-To- Peer," [16] T. Werner, "Botnet Shutdown Success Story: How Kaspersky Lab Disabled the Hlux/Kelihos Botnet," September, [17] "Trojan.Zeroaccess Symantec," _response/writeup.jsp%3fdocid%3d &sa=u&ei=o19su4- modcwuasz8ycidg&ved=0ccgqfjab&usg=afqjcnfsvax3l rt_ofmjmlsdp8vv2ktpda, July 13, [18] J. Wyke, "BACK CHANNELS AND BITCOINS: ZeroAccess SECRET C&C COMMUNICATIONS," ISSN: Page 65
7 es/medialibrary/pdfs/technical%20papers/wyke-vb2013.pdf, [19] J. Wyke, "The ZeroAccess Botnet: Mining and Fraud for Massive Financial Gain.," Sophos Technical Paper: ZeroAccess Botnet- Mining and Fraud for Massive Financial Gain, [20] A. Neville and R. Gibb, "ZeroAccess Indepth (Symantec Corporation White Paper)," [21] M. Giuliani, "ZeroAccess Rootkit Guards Itself with a Tripwire," July 8th, 2011 [22] J. Wyke, "Major shift in strategy for ZeroAccess rootkit malware, as it shifts to user-mode," June 6, [23] J. Wyke, "The ZeroAccess rootkit Naked Security," roaccess2/&sa=u&ei=o19su4- modcwuasz8ycidg&ved=0cc8qfjac&usg=afqjcnggo82w ZAWAGFmBz249QvROyjHT7A, [24] "ZeroAccess Modifies Peer-to-Peer Protocol for Resiliency," 20 Aug [25] R. Gibb, "Sinkholing the Zeroaccess botnet," VB2013.pdf, [26] R. Gibb, "ZeroAccess Modifies Peer-to-Peer Protocol for Resiliency," 20 Aug [27] [28] S. Ragan, "Millions of Home Networks Infected by ZeroAccess Botnet," October 31, [29] J. E. Dunn, "ZeroAccess bot has infected 2 million consumers, firm calculates. Techworld.," 2 November [30] F. Howard, "Sophos Technical Paper: Exploring the Blackhole Exploit Kit," mar2012.pdf, [31] K. C. Wilbur and Y. Zhu, "Click fraud," Marketing Science, vol. 28, pp , [32] N. Daswani and M. Stoppelman, "The anatomy of Clickbot. A," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007, pp [33] T. Reuters, "Huge ZeroAccess botnet disrupted by Microsoft," Dec 06, ISSN: Page 66
Lessons learned: Sinkholing the Zeroaccess botnet. Ross Gibb. Attack Investigations Team Symantec Security Response.
Lessons learned: Sinkholing the Zeroaccess botnet Ross Gibb Attack Investigations Team Symantec Security Response AIT - Zeroaccess 1 Agenda 1 Introduction to Zeroaccess 2 Details of the P2P protocol 3
2014 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-31, 2014 ASE 2014 ISBN: 978-1-62561-000-3 1
ASE 2014 ISBN: 978-1-62561-000-3 1 Network Traffic Analysis of ZeroAccess Bot Shree Garg, Anil K. Sarje, Sateesh K. Peddoju Department of Computer Science & Engineering Indian Institute of Technology Roorkee,
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
ZeroAccess. James Wyke. SophosLabs UK
ZeroAccess James Wyke SophosLabs UK Abstract ZeroAccess is a sophisticated kernel-mode rootkit that is rapidly becoming one of the most widespread threats in the current malware ecosystem. ZeroAccess ability
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Symptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 [email protected], 2 [email protected]
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
BotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report
Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report About this Report This report was compiled and published by the Tespok icsirt in partnership with the Serianu Cyber Threat Intelligence
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000
Network Security Protective and Dependable With the growth of the Internet threats, network security becomes the fundamental concerns of family network and enterprise network. To enhance your business
Protecting DNS Query Communication against DDoS Attacks
Protecting DNS Query Communication against DDoS Attacks Ms. R. Madhuranthaki 1, Ms. S. Umarani, M.E., (Ph.D) 2 II M.Tech (IT), IT Department, Maharaja Engineering College, Avinashi, India 1 HOD, IT Department,
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks
CSE 3482 Introduction to Computer Security Denial of Service (DoS) Attacks Instructor: N. Vlajic, Winter 2015 Learning Objectives Upon completion of this material, you should be able to: Explain the basic
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Sophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
Detection of Botnets Using Honeypots and P2P Botnets
Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.
AT&T Real-Time Network Security Overview
AT&T Real-Time Network Security Overview Dan Solero Director of Security Technology, AT&T Know Your Enemy: Security Threats Extend Beyond Viruses & Worms Distributed Denial of Service Spam for Hire Social
Ponmocup: a giant hiding in the shadows. By Maarten van Dantzig & Yonathan Klijnsma
Ponmocup: a giant hiding in the shadows By Maarten van Dantzig & Yonathan Klijnsma Overview What we ll be going through in this presentation 1. Who are we: what do we do 6. Plug-ins 6.1. Monetisation 2.
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Security Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?
Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)? Revised 11-29-2011 Aryeh Goretsky, MVP, ZCSE Table of Contents Introduction 3 The formal definition 3 Here s a
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.
Data Centers Protection from DoS attacks. Trends and solutions Michael Soukonnik, Radware Ltd [email protected] Riga. Baltic IT&T. 21.04.2010 Cybercrime Trends Page 2 Types of DoS attacks and classical
Protecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide
Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work
