ČELEDA, Pavel, Radek KREJČÍ and Vojtěch KRMÍČEK. Revealing and Analysing Modem Malware. Online. In 2012 IEEE International Conference on Communications (ICC). Ottawa, Canada: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2012, p. 971-975. ISBN 978-1-4577-2053-6.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Revealing and Analysing Modem Malware
Name in Czech Odhalování a analyzování malwaru v modemech
Authors ČELEDA, Pavel (203 Czech Republic, guarantor, belonging to the institution), Radek KREJČÍ (203 Czech Republic) and Vojtěch KRMÍČEK (203 Czech Republic, belonging to the institution).
Edition Ottawa, Canada, 2012 IEEE International Conference on Communications (ICC), p. 971-975, 5 pp. 2012.
Publisher IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA
Other information
Original language English
Type of outcome Proceedings paper
Field of Study Informatics
Country of publisher Canada
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
RIV identification code RIV/00216224:14610/12:00058686
Organization Ústav výpočetní techniky – Repository – Repository
ISBN 978-1-4577-2053-6
ISSN 1550-3607
UT WoS 000312855701059
Keywords (in Czech) modem; malware; botnet; Linux; MIPSel; bezpečnost; monitorování; síť; NetFlow; ISP
Keywords in English modem; malware; botnet; Linux; MIPSel; security; monitoring; network; NetFlow; ISP
Links OVMASUN200801, research and development project.
Changed by Changed by: RNDr. Daniel Jakubík, učo 139797. Changed: 1/9/2020 12:49.
Abstract
In this paper, we provide a formal description of modem malware life cycle. It is included a description of the modem malware evolution (history). We propose a set of techniques to perform detailed analysis of infected modem. We report on modem malware network activities in campus network and we propose NetFlow based detection method to reveal the modem malware spreading.
Abstract (in Czech)
V článku je uveden formální popis životního cyklu malwaru pro modemy. Je popsán evoluční vývoj malwaru pro modemy. Jsou navrženy techniky, které umožňují provádět detailní analýzu infikovaného modemu. Dále uvádíme informace o síťových aktivitách nakažených modemů v univerzitní síti a je navržena metoda využívající NetFlow data pro detekci šíření malwaru pro modemy.
Type Name Uploaded/Created by Uploaded/Created Rights
embedded-malware.pdf Licence Creative Commons  File version 9/1/2013

Properties

Name
embedded-malware.pdf
Address within IS
https://repozitar.cz/auth/repo/15803/72423/
Address for the users outside IS
https://repozitar.cz/repo/15803/72423/
Address within Manager
https://repozitar.cz/auth/repo/15803/72423/?info
Address within Manager for the users outside IS
https://repozitar.cz/repo/15803/72423/?info
Uploaded/Created
Wed 9/1/2013 11:45

Rights

Right to read
  • anyone on the Internet
Right to upload
 
Right to administer:
  • a concrete person RNDr. Daniel Jakubík, uco 139797
  • a concrete person Mgr. Ľuboš Lunter, uco 143320
Attributes
 
embedded-malware.pdf Licence Creative Commons  File version 1/9/2020

Properties

Name
embedded-malware.pdf
Address within IS
https://repozitar.cz/auth/repo/15803/894681/
Address for the users outside IS
https://repozitar.cz/repo/15803/894681/
Address within Manager
https://repozitar.cz/auth/repo/15803/894681/?info
Address within Manager for the users outside IS
https://repozitar.cz/repo/15803/894681/?info
Uploaded/Created
Tue 1/9/2020 12:49

Rights

Right to read
  • anyone on the Internet
Right to upload
 
Right to administer:
  • a concrete person Mgr. Lucie Vařechová, uco 106253
  • a concrete person RNDr. Daniel Jakubík, uco 139797
  • a concrete person Mgr. Jolana Surýnková, uco 220973
Attributes
 
Print
Add to clipboard Displayed: 29/6/2024 12:50