posted on 2024-07-13, 04:25authored byGrenville Armitage, John Nguyen
This paper describes a set of tools and techniques to capture and analyse virus-generated IP network traffic.We analyse seven viruses,worms,trojans and spyware that are common in Microsoft Windows environments.We log and analyse the IP traffic generated in the roughly 2 hours after each infection. Based on the resulting IP traffic patterns we estimate the likely financial impact of having an infected PC connected to a consumer-grade, broadband Internet connection.
History
Available versions
PDF (Published version)
Journal title
Australian Telecommunications Networks and Applications Conference 2004 (ATNAC2004), Sydney, Australia, 08-10 December 2004
Conference name
Australian Telecommunications Networks and Applications Conference 2004 ATNAC2004, Sydney, Australia, 08-10 December 2004
Publisher
Australian Telecommunications Networks and Applications Conference