1 / 18

Malware in Popular Networks

Malware in Popular Networks. Dmitry O. Gryaznov. Mostly viruses, few trojans Obvious destructive or annoying payload Mischief and vandalism Nothing gained but “glory”. Mostly non-replicating malware Trying to stay inconspicuous Theft and control Monetary gains. The Big Change. Then.

drew
Télécharger la présentation

Malware in Popular Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malware in Popular Networks Dmitry O. Gryaznov

  2. Mostly viruses, few trojans Obvious destructive or annoying payload Mischief and vandalism Nothing gained but “glory” Mostly non-replicating malware Trying to stay inconspicuous Theft and control Monetary gains The Big Change Then Now

  3. Malware “Highways” • E-mail • Usenet • Internet Relay Chat (IRC) • Peer-to-peer (P2P) • Instant Messaging (IM)

  4. Usenet • Since early 1980s • Over 100,000 newsgroups • Millions of users • Over 2 Terabytes daily • Mostly binaries – video, audio, software

  5. Top Ten Malware Detections in Usenet in 2005

  6. Internet Relay Chat (IRC) • Since early 1990s • Dozens of networks (EFNet, DALnet, Undernet, etc.) • Millions of users • Direct file spamming (via DCC Send) • URL spamming (via text messages) • Used by numerous malwares even when no IRC software was ever installed by user

  7. Top Ten Malware Detections in IRC in 2005

  8. Peer-to-peer networks (P2P) • File sharing: movies, music, software • Numerous networks (Kazaa, eDonkey, BitTorrent, Gnutella, etc.) • Millions of users • “Bridging” between different networks

  9. Top Ten Malware detections in Gnutella in 2005

  10. Questions?

More Related