Rhiannon Weaver
Software Engineering Institute
Publications by Rhiannon Weaver
-
Finding Related Malware Samples Using Run-Time Features
November 30, 2015 • Webinar
Rhiannon Weaver
Rhiannon Weaver discusses how a small subset of features from dynamic malware analysis can help to uncover possible relationships among files and to direct static reverse engineering efforts.
watch -
Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet
January 10, 2011 • Presentation
Rhiannon WeaverChris Nunnery (University of North Carolina)Gautam Singaraju (University of North Carolina)
In this presentation, the authors discuss a new method for measuring the discrepancy between counting IP addresses and counting individual machines in a botnet.
read -
Modeling Populations of Large-Scale Internet Threats
August 04, 2010 • Presentation
Rhiannon Weaver
In this presentation, Rhiannon Weaver describes malicious activity perpetrated through botnets, phishing, and malware, and describes related modeling approaches.
read -
A Continuous Time List Capture Model for Internet Threats
August 04, 2010 • White Paper
Rhiannon Weaver
In this paper, Rhiannon Weaver describes a population study of malware files under the CTLC framework and presents a simulation study as well as future work.
read -
Identifying Anomalous Port-Specific Network Behavior
May 01, 2010 • Technical Report
Rhiannon Weaver
In this report, Rhiannon Weaver describes a method for identifying network behavior that may be a sign of coming internet-wide attacks.
read -
A Probabilistic Population Study of the Conficker-C Botnet
February 01, 2010 • White Paper
Rhiannon Weaver
In this paper, Rhiannon Weaver estimates the number of active machines per hour infected with the Conficker-C worm using a probability model.
read -
Beyond the Top Talkers: Empirical Correlation of Conficker-C Infected IP Space
January 11, 2010 • Presentation
Rhiannon Weaver
In this presentation, Rhiannon Weaver discusses Conficker, a computer worm that targets the Microsoft Windows operating system.
read -
Fishing for Phishes: Applying Capture-Recapture Methods to Estimate Phishing Populations
October 04, 2007 • White Paper
Rhiannon WeaverM. P. Collins (Redjack)
In this paper, the authors describe addressing phishing problems by estimating population in terms of netblocks and by clustering phishing attempts into scams.
read -
Predicting Future Botnet Addresses With Uncleanliness
May 09, 2007 • Conference Paper
Michael CollinsTimothy J. ShimeallSid Faber
In this paper, the authors discuss whether we can effectively predict future bot locations.
read