June 2, 2022, 1:20 a.m. | Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao

cs.CR updates on arXiv.org arxiv.org

Self-contained loaders are widely adopted in botnets for injecting loading
commands and spawning new bots. While researchers can dissect bot clients to
get various information of botnets, the cloud-based and self-contained design
of loaders effectively hinders researchers from understanding the loaders'
evolution and variation using classic methods. The decoupled nature of bot
loaders also dramatically reduces the feasibility of investigating
relationships among clients and infrastructures. In this paper, we propose a
text-based method to investigate and analyze details of bot …

bot honeypot logs mining

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Officer Hospital Mission Viejo

@ Allied Universal | Mission Viejo, CA, United States

Junior Offensive Cyber Security Researcher

@ Draper | Cambridge, MA, United States

Consultant reporting reglementaire

@ Talan | Luxembourg, Luxembourg

Chief Information Security Officer

@ Kantox | Barcelona, Catalonia, Spain