Chapter 15 Notes

to accompany Sikorski and Honig, Practical Malware Analysis, no starch press

Malware-Focused Network Signatures

How to develop countermeasures? In other words, how do you keep malware out?

Network Countermeasures

Observing Malware in its Natural Habitat

Indications of Malicious Activity + OPSec

Getting IP Address and Domain Information

Content-Based Network Countermeasures

The World's Favorite IDS: Snort

Leveraging Client-Initiated Beaconing