Recent posts

TypePostAuthorRepliesLast updated
Imagefigure7 jamie.riden09 years 43 weeks ago
Imagefigure6 jamie.riden09 years 43 weeks ago
Imagefigure5 jamie.riden09 years 43 weeks ago
Imagefigure4 jamie.riden09 years 43 weeks ago
Imageinput-urls-by-cat jamie.riden09 years 43 weeks ago
Book pageCLIENT-SIDE ATTACKS jamie.riden09 years 43 weeks ago
Imageclient honeypot jamie.riden09 years 43 weeks ago
Imageserver honeypot jamie.riden09 years 43 weeks ago
Book pageINTRODUCTION jamie.riden09 years 43 weeks ago
Book pageAPPENDIX E: Fast-Flux Proxy Samples jamie.riden09 years 43 weeks ago
Book pageAPPENDIX D: Fast-Flux Proxy Samples jamie.riden09 years 43 weeks ago
Book pageAPPENDIX C: Fast-Flux Proxy Samples jamie.riden09 years 43 weeks ago
Book pageAPPENDIX B: The Infection Process jamie.riden09 years 43 weeks ago
Book pageAPPENDIX A: Fast-Flux Proxy Samples jamie.riden09 years 43 weeks ago
Book pageAPPENDICES jamie.riden09 years 43 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden09 years 43 weeks ago
Book pageSUMMARY jamie.riden09 years 43 weeks ago
Book pageDETECTION & MITIGATION jamie.riden09 years 43 weeks ago
Book pageSTATISTICS jamie.riden09 years 43 weeks ago
ImageFlux HTTP pie jamie.riden09 years 43 weeks ago
ImageFlux DNS pie jamie.riden09 years 43 weeks ago
Book pageFAST-FLUX CASE STUDY jamie.riden09 years 43 weeks ago
Book pageFAST-FLUX MALWARE jamie.riden09 years 43 weeks ago
Book pageREAL WORLD FAST-FLUX EXAMPLES jamie.riden09 years 43 weeks ago
Book pageADVANTAGES FOR THE ATTACKER jamie.riden09 years 43 weeks ago