{"385651":{"#nid":"385651","#data":{"type":"event","title":"Ph.D Thesis Proposal by Yacin Nadji","body":[{"value":"\u003Cp\u003EPh.D. Thesis Proposal\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ETitle: \u003Cstrong\u003EUnderstanding DNS-based Criminal Infrastructure to Perform Takedowns\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EYacin Nadji\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003ESchool of Computer Science\u003C\/p\u003E\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EDate: Thursday, March 5, 2015\u003C\/p\u003E\u003Cp\u003ETime: 10:00 am\u003C\/p\u003E\u003Cp\u003ELocation: KACB Room 3126\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ECommittee\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E----------------\u003C\/p\u003E\u003Cp\u003EProf. Wenke Lee (Co-advisor, School of Computer Science, Georgia Institute of Technology)\u003C\/p\u003EProf. Emmanouil Antonakakis (Co-advisor, School of Electrical and Computer Engineering, Georgia Institute of Technology)Prof. Douglas Blough (School of Electrical and Computer Engineering, Georgia Institute of Technology)Prof. Mustaque Ahamad (School of Computer Science, Georgia Institute of Technology)Prof. Michael Bailey (Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign)\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbstract\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E--------------\u003C\/p\u003EBotnets are a pervasive threat to the Internet and its inhabitants. A \u003Cem\u003Ebotnet\u003C\/em\u003E is a collectionof infected machines that receive commands from the \u003Cem\u003Ebotmaster\u003C\/em\u003E, a person, group or nation-state, to perform malicious actions. Instead of \u0022cleaning\u0022 individual infections, one can severthe method of communication between a botmaster and her zombies by attempting a \u003Cem\u003Ebotnet\u003C\/em\u003E\u003Cem\u003Etakedown\u003C\/em\u003E, which contains the botnet and its malicious actions.\u0026nbsp;Unfortunately, takedowns are currently performed without technical rigor nor are thereautomated and independent means to measure success or assist in performing them. Ourresearch focuses on understanding the criminal infrastructure that enables communicationbetween a botmaster and her zombies in order to measure attempts at, and to perform,successful takedowns. We show that by interrogating malware and performing large-scaleanalysis of passively collected network data, we can measure if a past botnet takedown wassuccessful and use the same techniques to perform m","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Understanding DNS-based Criminal Infrastructure to Perform Takedowns"}],"uid":"27707","created_gmt":"2015-03-09 09:48:06","changed_gmt":"2016-10-08 01:48:43","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2015-03-05T09:00:00-05:00","event_time_end":"2015-03-05T11:00:00-05:00","event_time_end_last":"2015-03-05T11:00:00-05:00","gmt_time_start":"2015-03-05 14:00:00","gmt_time_end":"2015-03-05 16:00:00","gmt_time_end_last":"2015-03-05 16:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"1808","name":"graduate students"},{"id":"913","name":"PhD"},{"id":"120011","name":"proposal defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1789","name":"Conference\/Symposium"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}