
{"id":153,"date":"2007-04-21T14:44:40","date_gmt":"2007-04-21T17:44:40","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=153"},"modified":"2007-04-21T14:44:40","modified_gmt":"2007-04-21T17:44:40","slug":"las-ponencias-de-hotbots-2007-disponibles-para-su-descarga","status":"publish","type":"post","link":"https:\/\/www.talsoft.com.ar\/site\/es\/las-ponencias-de-hotbots-2007-disponibles-para-su-descarga\/","title":{"rendered":"Las ponencias de HotBots 2007 disponibles para su descarga"},"content":{"rendered":"<p>Seg\u00c3\u00ban lo que se puede leer <a href=\"http:\/\/honeyblog.org\/archives\/107-Rishi-Identify-Bot-Contaminated-Hosts.html\">en honeyblog<\/a>, <a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/\">se han puesto a disposici\u00c3\u00b3n de los interesados<\/a> las ponencias de HotBots 07.<\/p>\n<p>El <em>First Workshop on Hot Topics in Understanding Botnets (HotBots \u00e2\u20ac\u02dc07)<\/em>, celebrada el pasado 10 de abril en Massachussets, EEUU, ha sido de los pocos grandes encuetros internacionales dedicado exclusivamente al estudio, an\u00c3\u00a1lisis y comprensi\u00c3\u00b3n del funcionamiento de las <a href=\"http:\/\/es.wikipedia.org\/wiki\/Botnet\">redes automatizadas de bots<\/a>.<\/p>\n<p>Falta hac\u00c3\u00adan este tipo de estudios, profesionales donde los haya, ya que el desconocimiento que se tiene de estas redes de equipos subyugados a atacantes es muy amplio, a\u00c3\u00ban siendo las redes responsables de la distribuci\u00c3\u00b3n de spam, phishing, ataques coordinados de denegaci\u00c3\u00b3n de servicios (DDoS) y otros muchos males importantes en redes tecnol\u00c3\u00b3gicas.<\/p>\n<p>Alguno de los documentos que podemos descargar son:<\/p>\n<p><strong>Redes peer-to-peer:<\/strong><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/grizzard\/grizzard.pdf\">Peer-to-Peer Botnets: Overview and Case Study<\/a><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/wang\/wang.pdf\">An Advanced Hybrid Peer-to-Peer Botnet<\/a><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/brodsky\/brodsky.pdf\">A Distributed Content Independent Method for Spam Detection<\/a><\/p>\n<p><strong>An\u00c3\u00a1lisis diverso:<\/strong><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/provos\/provos.pdf\"><br \/>\nThe Ghost in the Browser: Analysis of Web-based Malware<\/a><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/rajab\/rajab.pdf\">My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging<\/a> (realmente excelente, a ver si lo comento un d\u00c3\u00ada)<br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/barford\/barford.pdf\">Toward Botnet Mesocosms<\/a><\/p>\n<p><strong>Detecci\u00c3\u00b3n, respuesta y an\u00c3\u00a1lisis:<\/strong><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/karasaridis\/karasaridis.pdf\">Wide-Scale Botnet Detection and Characterization<\/a><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/goebel\/goebel.pdf\">Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation<\/a><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/simon\/simon.pdf\">AS-Based Accountability as a Cost-Effective DDoS Defense<\/a><\/p>\n<p><strong>Case studies:<\/strong><br \/>\nPanel: Legal Issues About Botnet Tracking and Response (sin documento asociado)<br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/chiang\/chiang.pdf\">A Case Study of the Rustock Rootkit and Spam Bot<\/a><br \/>\n<a href=\"http:\/\/www.usenix.org\/events\/hotbots07\/tech\/full_papers\/daswani\/daswani.pdf\">The Anatomy of Clickbot.A<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00c3\u00ban lo que se puede leer en honeyblog, se han puesto a disposici\u00c3\u00b3n de los interesados las ponencias de HotBots 07. El First Workshop on Hot Topics in Understanding Botnets (HotBots \u00e2\u20ac\u02dc07), celebrada el pasado 10 de abril en Massachussets, EEUU, ha sido de los pocos grandes encuetros internacionales dedicado exclusivamente al estudio, an\u00c3\u00a1lisis y [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-153","post","type-post","status-publish","format-standard","hentry","category-noticias","category-profesional"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=153"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/153\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/categories?post=153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/tags?post=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}