eldorado.tu-dortmund.de/server/api/core/bitstreams/58953e56-2602-445c-9d85-b32666ab788c/content
Web-Authentisierung mit dem ePA
135/TCP)
◦ Targets server/daemon software
◦ Today: indirect infections, i.e. no direct communication between infector and victim (e.g. drive-by infections)
◦ Targets client software
18
445/TCP
135/TCP
HTTP
HTTP/FTP [...] 2
1. Problem statement and requirements
3
Problem statement (1/2)
Malicious remote controlled software, i.e. bots, cause lots of problems in today‘s Internet
Malicious network traffic examples
◦ Related [...] byte signatures are no longer applicable
Is it possible to detect malicious remote controlled software based on its network behavior?
5
Requirements of a behavior-based bot detection method
Must-have …