Awesome
pahuus
Abstract
The idea is to enumerate the state of the art in detecting malware command & control traffic. Do silver bullets exist? Any well-hidden gems? Why are we not seeing products making use of previous research? Are there methods that actually work? Is the code available? Can we reproduce any positive results?
Project plan, steps
- Improve project plan
- Find and list suitable papers, conference presentations & proceedings etc.
- Filter out the promising ones
- Identify proposed methods and possible results, consider reproducibility
- Present findings as a table
- Reproduce / test some methods against available test datasets
- Possibly produce test datasets without private information
- Write the thesis
List of sources to search for papers
- Keywords: ???
- Proceedings from: FloCon, ???
List of papers to read & consider
- Paper 1, link
- Paper 2
Probably not these
...