The Honeynet ProjectThe Honeynet Project

  • Old Homepage

Navigation

  • About us
  • Blogs
    • Honeynet Project Blog
  • Funding/Donations
  • Challenges
  • Chapters
  • Papers
  • Projects
  • Code of Conduct
  • Google SoC
    • Google SoC 2018
      • Project Ideas
      • Application Tips
      • Student Template
    • Google SoC 2017
    • Google SoC 2016
    • Google SoC 2015
    • Google SoC 2014
    • Google SoC 2013
    • Google SoC 2012
    • Google SoC 2011
    • Google SoC 2010
    • Google SoC 2009
  • Recent posts
  • Security Workshops
    • 2017 - Canberra
    • 2016 - San Antonio
    • 2015 - Stavanger
    • 2014 - Warsaw
    • 2013 - Dubai
    • 2012 - SF Bay Area
    • 2011 - Paris

Internal

  • Login
  • Recent posts
Home

Know Your Enemy: Fast-Flux Service Networks

Sat, 08/16/2008 - 17:21 — jamie.riden
  • Twitter logo Twitter
  • Facebook logo Facebook
  • LinkedIn logo LinkedIn

An Ever Changing Enemy Primary Authors:
William Salusky
Robert Danford
Last Modified: 13 July, 2007

  • INTRODUCTION
  • HOW FAST-FLUX SERVICE NETWORKS WORK
  • SINGLE-FLUX NETWORKS
  • DOUBLE-FLUX SERVICE NETWORKS
  • ADVANTAGES FOR THE ATTACKER
  • REAL WORLD FAST-FLUX EXAMPLES
  • FAST-FLUX MALWARE
  • FAST-FLUX CASE STUDY
  • STATISTICS
  • DETECTION & MITIGATION
  • SUMMARY
  • ACKNOWLEDGEMENTS
  • APPENDICES
INTRODUCTION ›
  • Printer-friendly version
  • Twitter logo Twitter
  • Facebook logo Facebook
  • LinkedIn logo LinkedIn
Blog Feed
LinkedIn
Facebook
Twitter
YouTube

We are a 501c3 non-profit, all volunteer organization. Consider donating to support our forensic challenges, tools development, and research.

Latest tweets

@ProjectHoneynet tweetsfollow @ProjectHoneynet

Papers

  • Know Your Enemy: Containing Conficker
  • Know Your Enemy Lite: Proxy Threats - Socks v666
  • Know Your Enemy: Malicious Web Servers
  • Know Your Enemy: Fast-Flux Service Networks
    • INTRODUCTION
    • HOW FAST-FLUX SERVICE NETWORKS WORK
    • SINGLE-FLUX NETWORKS
    • DOUBLE-FLUX SERVICE NETWORKS
    • ADVANTAGES FOR THE ATTACKER
    • REAL WORLD FAST-FLUX EXAMPLES
    • FAST-FLUX MALWARE
    • FAST-FLUX CASE STUDY
    • STATISTICS
    • DETECTION & MITIGATION
    • SUMMARY
    • ACKNOWLEDGEMENTS
    • APPENDICES
  • Know Your Enemy: Behind the Scenes of Malicious Web Servers
  • Know your Enemy: Web Application Threats
  • Know Your Enemy: A Forensic Analysis
  • Know Your Enemy: Defining Virtual Honeyents
  • Know Your Enemy: GenII Honeynets
  • Know Your Enemy: Honeynets
  • Know Your Enemy: Honeynets In Universities
  • Know Your Enemy: Honeywall CDROM
  • Know Your Enemy: Learning with User-Mode Linux
  • Know Your Enemy: Passive Fingerprinting
  • Know your Enemy: Phishing
  • Know Your Enemy: Sebek
  • Know Your Enemy: Statistics
  • Know Your Enemy: The Social Dynamics of Hacking
  • Know your Enemy: Tracking Botnets
  • Know Your Enemy: Trends
  • Know Your Enemy: Worms at War
  • Know Your Tools: Glastopf - A dynamic, low-interaction web application honeypot
  • Know Your Tools: Qebek – Conceal the Monitoring
  • Know Your Tools: use Picviz to find attacks
  • Know Your Enemy: Automated Credit Card Fraud
  • Know Your Enemy: Motives
  • Know Your Enemy: III
  • Know Your Enemy: II
  • Know Your Enemy: I