Recent posts

TypePostAuthorRepliesLast updated
Imagefigure6 jamie.riden07 years 25 weeks ago
Imagefigure5 jamie.riden07 years 25 weeks ago
Imagefigure4 jamie.riden07 years 25 weeks ago
Imageinput-urls-by-cat jamie.riden07 years 25 weeks ago
Book pageCLIENT-SIDE ATTACKS jamie.riden07 years 25 weeks ago
Imageclient honeypot jamie.riden07 years 25 weeks ago
Imageserver honeypot jamie.riden07 years 25 weeks ago
Book pageINTRODUCTION jamie.riden07 years 25 weeks ago
Book pageAPPENDIX E: Fast-Flux Proxy Samples jamie.riden07 years 25 weeks ago
Book pageAPPENDIX D: Fast-Flux Proxy Samples jamie.riden07 years 25 weeks ago
Book pageAPPENDIX C: Fast-Flux Proxy Samples jamie.riden07 years 25 weeks ago
Book pageAPPENDIX B: The Infection Process jamie.riden07 years 25 weeks ago
Book pageAPPENDIX A: Fast-Flux Proxy Samples jamie.riden07 years 25 weeks ago
Book pageAPPENDICES jamie.riden07 years 25 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden07 years 25 weeks ago
Book pageSUMMARY jamie.riden07 years 25 weeks ago
Book pageDETECTION & MITIGATION jamie.riden07 years 25 weeks ago
Book pageSTATISTICS jamie.riden07 years 25 weeks ago
ImageFlux HTTP pie jamie.riden07 years 25 weeks ago
ImageFlux DNS pie jamie.riden07 years 25 weeks ago
Book pageFAST-FLUX CASE STUDY jamie.riden07 years 25 weeks ago
Book pageFAST-FLUX MALWARE jamie.riden07 years 25 weeks ago
Book pageREAL WORLD FAST-FLUX EXAMPLES jamie.riden07 years 25 weeks ago
Book pageADVANTAGES FOR THE ATTACKER jamie.riden07 years 25 weeks ago
Book pageSINGLE-FLUX NETWORKS jamie.riden07 years 25 weeks ago