search menu icon-carat-right cmu-wordmark

A Case Study - Using Flow to Identify Specific Malware Characteristics

January 2010 Presentation
Jonathan Taimanglo (Department of Homeland Security), Michael Jacobs (Department of Homeland Security)

In this presentation, US-CERT staff explain how they narrowed a large dataset to a few suspicious IP addresses using SiLK and PERL.

Publisher:

Software Engineering Institute

Abstract

In this presentation, given at FloCon 2010, US-CERT staff explain how they narrowed a large dataset to a few suspicious IP addresses using SiLK and PERL.