Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
ANONYMOUS AND MALICIOUS HIRT & AYCOCK 2 VIRUS BULLETIN CONFERENCE OCTOBER 2005
 

Summary: ANONYMOUS AND MALICIOUS HIRT & AYCOCK
2 VIRUS BULLETIN CONFERENCE OCTOBER 2005
ANONYMOUS AND MALICIOUS
Andreas Hirt and John Aycock
Department of Computer Science, University of
Calgary, Calgary, Alberta, Canada
Email hirt@cpsc.ucalgary.ca,
aycock@cpsc.ucalgary.ca
ABSTRACT
Zombie networks have been used for spamming and DDoS
attacks. Worms have been designed to receive commands from
their creator and update themselves automatically. But the
combination of malware and powerful anonymous
communication techniques has not been seen yet.
There is a growing body of research work on anonymous
communication schemes, which are developed legitimately to
allow people to communicate without fear of identification or
retribution. For example, such communication could be used
by people living under oppressive regimes.
Malware using anonymous communication would be as

  

Source: Aycock, John - Department of Computer Science, University of Calgary

 

Collections: Computer Technologies and Information Sciences