<node id="385651">
  <nid>385651</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1425894486</created>
  <changed>1475891323</changed>
  <title><![CDATA[Ph.D Thesis Proposal by Yacin Nadji]]></title>
  <body><![CDATA[<p>Ph.D. Thesis Proposal&nbsp;</p><p>&nbsp;</p><p>Title: <strong>Understanding DNS-based Criminal Infrastructure to Perform Takedowns</strong></p><p>&nbsp;</p><p><strong>Yacin Nadji</strong></p><p>School of Computer Science</p><p>Georgia Institute of Technology</p><p>&nbsp;</p><p>Date: Thursday, March 5, 2015</p><p>Time: 10:00 am</p><p>Location: KACB Room 3126</p><p>&nbsp;</p><p><strong>Committee</strong></p><p>----------------</p><p>Prof. Wenke Lee (Co-advisor, School of Computer Science, Georgia Institute of Technology)</p>Prof. Emmanouil Antonakakis (Co-advisor, School of Electrical and Computer Engineering, Georgia Institute of Technology)Prof. Douglas Blough (School of Electrical and Computer Engineering, Georgia Institute of Technology)Prof. Mustaque Ahamad (School of Computer Science, Georgia Institute of Technology)Prof. Michael Bailey (Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign)<p>&nbsp;</p><p><strong>Abstract</strong></p><p>--------------</p>Botnets are a pervasive threat to the Internet and its inhabitants. A <em>botnet</em> is a collectionof infected machines that receive commands from the <em>botmaster</em>, a person, group or nation-state, to perform malicious actions. Instead of "cleaning" individual infections, one can severthe method of communication between a botmaster and her zombies by attempting a <em>botnet</em><em>takedown</em>, which contains the botnet and its malicious actions.&nbsp;Unfortunately, takedowns are currently performed without technical rigor nor are thereautomated and independent means to measure success or assist in performing them. Ourresearch focuses on understanding the criminal infrastructure that enables communicationbetween a botmaster and her zombies in order to measure attempts at, and to perform,successful takedowns. We show that by interrogating malware and performing large-scaleanalysis of passively collected network data, we can measure if a past botnet takedown wassuccessful and use the same techniques to perform m]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Understanding DNS-based Criminal Infrastructure to Perform Takedowns]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2015-03-05T09:00:00-05:00]]></value>
      <value2><![CDATA[2015-03-05T11:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1789</tid>
        <value><![CDATA[Conference/Symposium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
          <item>
        <tid>913</tid>
        <value><![CDATA[PhD]]></value>
      </item>
          <item>
        <tid>120011</tid>
        <value><![CDATA[proposal defense]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
