Home

Awesome

pahuus

Abstract

The idea is to enumerate the state of the art in detecting malware command & control traffic. Do silver bullets exist? Any well-hidden gems? Why are we not seeing products making use of previous research? Are there methods that actually work? Is the code available? Can we reproduce any positive results?

Project plan, steps

  1. Improve project plan
  2. Find and list suitable papers, conference presentations & proceedings etc.
  3. Filter out the promising ones
  4. Identify proposed methods and possible results, consider reproducibility
  5. Present findings as a table
  6. Reproduce / test some methods against available test datasets
  7. Possibly produce test datasets without private information
  8. Write the thesis

List of sources to search for papers

List of papers to read & consider

Probably not these

...

List of papers/methods