search menu icon-carat-right cmu-wordmark

Detecting Malware P2P Traffic Using Network Flow and DNS Analysis

January 2013 Presentation

In this presentation, John Jerrim discusses Malware that uses P2P protocols for command and control, and describes a tool for detecting/classifying P2P traffic.

Publisher:

Software Engineering Institute

Abstract

In this presentation, John Jerrim discusses Malware that uses P2P protocols for command and control, and describes a tool for detecting/classifying P2P traffic.