Tagged articles
4 articles
Page 1 of 1
Bilibili Tech
Bilibili Tech
Jan 17, 2023 · Information Security

Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures

The article delivers a technical overview of modern botnet threats, detailing the PBot and Xanthe families, their infection vectors, command‑and‑control operations, and provides practical detection, mitigation, and statistical analysis methods for defending against large‑scale DDoS, spam, and other malicious activities.

BotnetDetectionSuricata
0 likes · 17 min read
Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Nov 15, 2022 · Information Security

Step‑by‑Step Guide to Installing Suricata and Understanding Its Working Modes

This guide walks through installing Suricata on a Linux system, covering prerequisite libraries, source compilation, configuration paths, execution command, and an analysis of its packet‑processing modes—including single, work, and autofp—while illustrating thread workflow and recommending optimal setups for multi‑NIC environments.

IDSIPSLinux Installation
0 likes · 7 min read
Step‑by‑Step Guide to Installing Suricata and Understanding Its Working Modes
Bilibili Tech
Bilibili Tech
Nov 4, 2022 · Information Security

Analysis of Sliver C2 Tool Traffic Features and Detection Rules for Snort/Suricata

The paper systematically analyzes the Sliver C2 framework’s HTTP and HTTPS traffic, detailing URL, cookie, and parameter patterns as well as JA3/JA3S TLS fingerprints, and presents validated Snort and Suricata rules that reliably detect Sliver beacons while highlighting evasion challenges and broader applicability to emerging malware tools.

C2 detectionJA3Snort
0 likes · 17 min read
Analysis of Sliver C2 Tool Traffic Features and Detection Rules for Snort/Suricata