An Approach to Detect Malware Call-Home Activities

It is very common for active malware to call home, either to fetch updates and instructions or to send back stolen information. In an internal network where web access to the Internet must go through a proxy, the traffic that doesn't pass through the proxy and by default is dropped by the gateway...
By
Tyler (Tianqiang) Cui
January 17, 2014

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg