The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - May (2013 vol.46)
pp: 76-82
Qing Li , Blue Coat Systems
Chris Larsen , Blue Coat Systems
Tim van der Horst , Blue Coat Systems
ABSTRACT
Ultimately, only cloud-based approaches will provide effective weapons for solving the wide spectrum of new security challenges associated with running IPv6.
INDEX TERMS
Malware, Mobile handsets, Servers, IP networks, Web sites, Cloud computing, Security, Blue Coat Systems, botnets, malware, Web security, IPv4, IPv6, policy enforcement, enterprise networks, mobile networks, WebPulse
CITATION
Qing Li, Chris Larsen, Tim van der Horst, "IPv6: A Catalyst and Evasion Tool for Botnets and Malware Delivery Networks", Computer, vol.46, no. 5, pp. 76-82, May 2013, doi:10.1109/MC.2012.296
REFERENCES
1. D. Gourley et al., HTTP: The Definitive Guide, O'Reilly, 2002.
2. M. Baugher and V. Lortz, "Home-Network Threats and Access Controls," Proc. 4th Int'l Conf. Trust and Trustworthy Computing (Trust 11), LNCS 6740, Springer, 2011, pp. 217-230.
3. C.A. Schiller et al., Botnets: The Killer Web App, Syngress, 2007.
4. D. Stuttard and M. Pinto, The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, Wiley, 2008.
5. Q. Li, T. Jinmei, and K. Shima, IPv6 Core Protocols Implementation, Morgan Kaufmann, 2006.
6. A.P. Felt et al., "A Survey of Mobile Malware in the Wild," Proc. 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices (SPSM 11), ACM, 2011, pp. 3-14.
7. C. Mulliner, N. Golde, and J.-P. Seifert, "SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale," Proc. 20th Usenix Security Symp., Usenix, 2011; http://static.usenix.org/events/sec11/tech/ full_papersMulliner.pdf.
8. A. Goode, "Managing Mobile Security: How Are We Doing?," Network Security, Feb. 2010, pp. 12-15.
9. Q. Li and C. Yao, Real-Time Concepts for Embedded Systems, CMP Books, 2003.
10. N. Moran, "Understanding Advanced Persistent Threats: A Case Study," ;login:, vol. 36, no. 4, 2011; www.usenix.org/publications/login/august-2011-volume-36-number-4 understanding-advanced-persistent-threats-case.
11. I.I. Amit, "Advanced Data Exfiltration—The Way Q Would Have Done It," Sept. 2011; www.iamit.org/blog/wp-content/uploads/2012/ 01Advanced-data-exfiltration-%E2%80%93-the-way-Q-would-have-done-it.pdf.
12. D. Heiland, "From Printer to Pwnd: Leveraging Multifunction Printers during Penetration Testing," presentation, ShmooCon 11, 2011; www.youtube.comwatch?v=uPbKVhvIzM8.
13. R. Spears and R. Melgares, "Zigbee Security: Find, Fix, Finish," presentation, ShmooCon 11, 2011; www.youtube.comwatch?v=SvCbIOwblqM.
14. W. Salusky and R. Danford, "Know Your Enemy: Fast-Flux Service Networks," blog, 13 July 2007; www.honeynet.org/papersff.
15. S. Groat et al., "Using an IPv6 Moving Target Defense to Protect the Smart Grid," Proc. 3rd Conf. Innovative Smart Grid Technologies (ISGT 12), IEEE, 2012, pp. 1-7.
16. L.V. Fausett, Fundamentals of Neural Networks: Architectures, Algorithms and Applications, Prentice Hall, 1993.
17. N. Johnston, "Blackhole Exploit Kit Gets an Upgrade: Pseudo-random Domains," blog, 26 June 2012; www.symantec.com/connect/blogsblackhole-exploit-kit-gets-upgrade-pseudo-random-domains.
18. C. Larsen, "Malware Is Like a Box of Chocolates," blog, 27 June 2012; http://bluecoat.com/security/security-archive/ 2012-06-27malware-box-chocolates.
19. C. Larsen, "A Look at the MySQL.com Hack-attack," blog, 27 Sept. 2011; http://bluecoat.com/security/security-archive/ 2011-09-27look-mysqlcom-hack-attack-0.
20. C. Larsen, "Notes on the Urchin Site-injection Attack," blog, 20 Oct. 2011; www.bluecoat.com/security/security-archive/ 2011-10-20notes-urchin-site-injection-attack-0.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool