SlideShare a Scribd company logo
1 of 22
Download to read offline
Botnet
Detection

A brief Incursion into Botnet Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

Anant Narayanan

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Advanced Topics in Computer and Network Security
October 5, 2009
Botnet Detection
What We’re Going To Cover
Botnet
Detection

1
Introduction

Introduction

2

BotSniffer
Control Channels
Architecture
Algorithms
Results

3

DNSBL Method
Counter-intelligence
Reconnaissance

4

Conclusion

BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Botnet Detection
What Are Botnets?
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Networks of “zombie” computers
The perpetrator compromises a series of systems using
various tools on existing security holes
Then, he simply controls these bots to do his bidding
Botnet Detection
Why Are They Bad?
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Botnet Detection
How Do They Work?
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

PULL
HTTP(S) is the most commonly used protocol
A simple GET request at regular interval to receive
commands
PUSH
IRC(S) is the most commonly used protocol
All bots join a chat room and wait for commands
Botnet Detection
How Can We Stop Them?
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Prevent computer from being infected in the first place?
Impractical, given the thousands of vulnerable machines
that will probably never be patched
Actively prevent commands from reaching bots, or prevent
bots from acting on those commands (use the network)
Passively detect a botnet’s presence and take offline action
Botnet Detection
Detecting C&C Traffic
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Botnet C&C Traffic is difficult to detect because:
Uses normal protocols in ordinary ways
Traffic volume is low
Number of bots in a monitored network may be small
Traffic may use encrypted channels

Botnet Detection
Spatial-Temporal Correlation!
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Pre-programmed response activities
Command is sent to all bots around the same time
(especially true for PUSH models)
Bots process and usually perform some network operation
in response
Ordinary network traffic is unlikely to demonstrate such
synchronized or correlated behavior

Conclusion

Response Types
Message response: Execution result, status or progress
Activity response: Actual (malicious) network activity

Botnet Detection
Message Response (e.g., IRC PRIVMSG)

Activity Response (binary downloading)

(a) Message response crowd.

(b) Activity response crowd.

BotSniffer: Architecture

Figure 2. Spatial-temporal correlation and similarity in bot responses (message response an
response).
Botnet
Detection

Monitor Engine
Introduction

Reports
Activity
Response
Detection
Scan

BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Malicious Activity
Events

Spam
Network
Traffic

Preprocessing
(WhiteList
WatchList)

Correlation
Engine

Binary
Downloading

Protocol
Matcher

HTTP/IRC
Connection
Records

HTTP

Activity Log

IRC

Conclusion
Network Traffic of
IRC PRIVMSG

Message Records
Message
Response
Detection
Incoming
PRIVMSG Analyzer
Outgoing
PRIVMSG Analyzer

Figure 3. BotSniffer Architecture.
Botnet Detection

Reports
Monitor Engine
Botnet
Detection

Preprocessing:
Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Unlikely protocols
White lists

Protocol Matcher
Currently focuses on IRC/HTTP

Message Response Detection
IRC PRIVMSG responses

Activity Response Detection
Abnormally high scan rates
Weighted failed connection rates
SMTP connections

Botnet Detection
Correlation Engine
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

First, the BotSniffer groups clients according to their
destination IPs and ports
Then, it perform correlation analysis on these groups

Botnet Detection
Group Activity Response
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

Response-Crowd-Density-Check
H0 → “Not Botnet”, H1 → “Botnet”, Yi → i th group member
Pr (Y1 , . . . , Yn |H1 )
Yi |H1
=
ln
Pr (Y1 , . . . , Yn |H0 )
Pr |H0
i
User chooses α (false positive rate) and β (false negative rate)

∧n = ln

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Threshold Random Walk
When Yi = 1, increment by ln θ1
θ0
1−θ1
When Yi = 0, decrement by ln 1−θ0

If the walk reaches ln 1−β it is a botnet
α
β
If it reaches ln 1−α it is not
Otherwise, we watch the next round
Botnet Detection
Group Message Response
Botnet
Detection

Instead of looking at density, let’s look at homogeneity
Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Response-Crowd-Homogeneity-Check
Let Yi denote if the i th crowd is homogenous or not
Homogeneity is decided by the Dice factor
Dice(X , Y ) =

2|ngrams(X ) ∩ ngrams(Y )|
|ngrams(X )| + |ngrams(Y )|

Now, for q clients in the crowd, compare all unique pairs and
calculate their Dice distances. If (for eg.) > 50% are within a
threshold t, the crowd is marked as homogenous

Botnet Detection
Botnet
Detection

i.e., P r(X = i) = m pi (1 − p)m−i . Then the probability
i
of having more
Selecting q and tthan k similar pairs is P r(X ≥ k) =
m
m i
m−i
. If we pick k = mt where t is
i=k i p (1 − p)
the threshold to decide whether a crowd is homogeneous,
we obtain the probability θ(q) = P r(X ≥ mt).
1

Introduction

0.9

BotSniffer

is eve
reaso
thoug
the T
[17, 2
In
botne
round

0.8

Control
Channels
Architecture
Algorithms
Results

Counterintelligence
Reconnaissance

Conclusion

0.6

θ(q)

DNSBL
Method

0.7

where
negat
is no
messa

0.5

0.4

q=2,t=0.5
q=4,t=0.5
q=6,t=0.5
q=4,t=0.6
q=6,t=0.6

0.3

0.2

0.1

0

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

p

Figure 4. θ(q), the probability of crowd homogeneity with q responding clients, and
Botnet Detection

These
Single client detection
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

IRC
We can make use of the fact that IRC is a broadcast protocol
and apply the homogeneity check on incoming messages to a
single client
HTTP
Bots have strong periodical visiting patterns (to connect and
retrieve commands)
Botnet Detection
Did it Work?
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Trace
IRC-1
IRC-2
IRC-3
IRC-4
IRC-5
IRC-6
IRC-7
IRC-8
All-1
All-2
All-3
All-4
All-5

trace size
54MB
14MB
516MB
620MB
3MB
155MB
60MB
707MB
4.2GB
6.2GB
7.6GB
15GB
24.5GB

duration
171h
433h
1,626h
673h
30h
168h
429h
1,010h
10m
10m
1h
1.4h
5h

Pkt
189,421
33,320
2,073,587
4,071,707
19,190
1,033,318
393,185
2,818,315
4,706,803
6,769,915
16,523,826
21,312,841
43,625,604

TCP flows
10,530
4,061
4,577
24,837
24
6,981
717
28,366
14,475
28,359
331,706
110,852
406,112

(IRC/Web) servers
2,957
335
563
228
17
85
209
2,454
1,625
1,576
1,717
2,140
2,601

FP
0
0
6
3
0
1
0
1
0
0
0
0
0

Table 1. Normal traces statistics (left part) and detection results (right columns).
Botnet Detection
Did it Work?
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

BotTrace
B-IRC-G
B-IRC-J-1
B-IRC-J-2
V-Rbot
V-Spybot
V-Sdbot
B-HTTP-I
B-HTTP-II

trace size
950k
26MB
15MB
66KB
6MB
37MB

duration
8h
1,267s
1,931s
533s
3.6h
19h

Pkt
4,447
143,431
262,878
347,153
180,822
474
65,695
395,990

TCP flow
189
103,425
147,921
14
237
790

Detected
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes

Table 2. Botnet traces statistics and detection results.
Botnet Detection
Passive Detection
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

DNSBL
DNS Blackhole Lists contain IP addresses that are sources
of spam. Botmasters sell bots not on any DNSBL at a
premium price
Thus, Botmasters themselves perform lookups on DNSBLs
to determine the status of their bots. Can we use this?
Botnet Detection
Heuristics
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Spatial
A legitimate mail server will perform queries and be the object
of queries. Bots will only perform queries, they will be not be
queried for by other hosts
Botnet Detection
Heuristics
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Temporal
Legitimate lookups are typically driven automatically when
emails arrive at the mail server and will this arrive at a rate
that mirrors arrival rates of emails
Botnet Detection
Types
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Self Lookup: Each bot looks up it’s own DNSBL record.
Usually a dead giveaway, thus not used
Third-party Lookup: All bots are looked up by a single
dedicated machine. If that machine isn’t a mail server, we
can simply use Spatial heuristics and detect botnet
membership
Distributed Lookups: Each bot looks up a set of records
for other bots in the network. Complicated to implement
and spatial heuristics will fail. Temporal heuristics,
however, may help in detection

Botnet Detection
Thanks for Listening
Botnet
Detection

Introduction
BotSniffer
Control
Channels
Architecture
Algorithms
Results

DNSBL
Method
Counterintelligence
Reconnaissance

Conclusion

Detecting botnets is hard work, but certainly possible!
Questions?

Botnet Detection

More Related Content

What's hot

A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsAlexander Decker
 
Botnet Detection in Online-social Network
Botnet Detection in Online-social NetworkBotnet Detection in Online-social Network
Botnet Detection in Online-social NetworkRubal Sagwal
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet ArchitectureBini Bs
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysisidescitation
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet DetectorBrenton Mallen
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about BotnetNaveen Titare
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesFabrizio Farinacci
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The BotmasterIJERA Editor
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation methodAcad
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & BotnetKendiv
 

What's hot (20)

about botnets
about botnetsabout botnets
about botnets
 
Botnet
BotnetBotnet
Botnet
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
BOTNET
BOTNETBOTNET
BOTNET
 
BotNet Attacks
BotNet AttacksBotNet Attacks
BotNet Attacks
 
Botnets
BotnetsBotnets
Botnets
 
Botnet Detection in Online-social Network
Botnet Detection in Online-social NetworkBotnet Detection in Online-social Network
Botnet Detection in Online-social Network
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
A Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior AnalysisA Dynamic Botnet Detection Model based on Behavior Analysis
A Dynamic Botnet Detection Model based on Behavior Analysis
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
Botnet
BotnetBotnet
Botnet
 
All you know about Botnet
All you know about BotnetAll you know about Botnet
All you know about Botnet
 
A Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection ApproachesA Taxonomy of Botnet Detection Approaches
A Taxonomy of Botnet Detection Approaches
 
098
098098
098
 
Tracing Back The Botmaster
Tracing Back The BotmasterTracing Back The Botmaster
Tracing Back The Botmaster
 
Botnet detection by Imitation method
Botnet detection  by Imitation methodBotnet detection  by Imitation method
Botnet detection by Imitation method
 
Botnet
BotnetBotnet
Botnet
 
Storm Worm & Botnet
Storm Worm & BotnetStorm Worm & Botnet
Storm Worm & Botnet
 

Similar to Botnet Detection Techniques

Feature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet trafficFeature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet trafficPratik Narang
 
Synopsis viva presentation
Synopsis viva presentationSynopsis viva presentation
Synopsis viva presentationkirubavenkat
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationIJERA Editor
 
Machine Learning Based Botnet Detection
Machine Learning Based Botnet DetectionMachine Learning Based Botnet Detection
Machine Learning Based Botnet Detectionbutest
 
BotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the InternetBotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the InternetGianluca Stringhini
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachAcademia Sinica
 
Studies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication NetworkStudies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication NetworkNeetaSingh38
 
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007Kalman Graffi
 
Feature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic DetectionFeature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic DetectionIvan Letteri
 
A machine consciousness approach to urban traffic signal control
A machine consciousness approach to urban traffic signal controlA machine consciousness approach to urban traffic signal control
A machine consciousness approach to urban traffic signal controlAndré Paraense
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Preventiondcalhoun1984
 
Detection of Peer-to-Peer Botnets using Graph Mining
Detection of Peer-to-Peer Botnets using Graph MiningDetection of Peer-to-Peer Botnets using Graph Mining
Detection of Peer-to-Peer Botnets using Graph MiningIJCNCJournal
 
DETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MINING
DETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MININGDETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MINING
DETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MININGIJCNCJournal
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Lightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFALightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFAIJNSA Journal
 
Botnets behavioral patterns in the network. A Machine Learning study of botne...
Botnets behavioral patterns in the network. A Machine Learning study of botne...Botnets behavioral patterns in the network. A Machine Learning study of botne...
Botnets behavioral patterns in the network. A Machine Learning study of botne...Czech Technical University in Prague
 
The DEBS Grand Challenge 2017
The DEBS Grand Challenge 2017The DEBS Grand Challenge 2017
The DEBS Grand Challenge 2017Roman Katerinenko
 

Similar to Botnet Detection Techniques (20)

Feature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet trafficFeature selection for detection of peer to-peer botnet traffic
Feature selection for detection of peer to-peer botnet traffic
 
2 dc meet new
2 dc meet new2 dc meet new
2 dc meet new
 
Synopsis viva presentation
Synopsis viva presentationSynopsis viva presentation
Synopsis viva presentation
 
Towards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classificationTowards botnet detection through features using network traffic classification
Towards botnet detection through features using network traffic classification
 
Machine Learning Based Botnet Detection
Machine Learning Based Botnet DetectionMachine Learning Based Botnet Detection
Machine Learning Based Botnet Detection
 
BotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the InternetBotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the Internet
 
Botnets - Detection and Mitigation
Botnets - Detection and MitigationBotnets - Detection and Mitigation
Botnets - Detection and Mitigation
 
Identifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis ApproachIdentifying MMORPG Bots: A Traffic Analysis Approach
Identifying MMORPG Bots: A Traffic Analysis Approach
 
Studies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication NetworkStudies On Traffic Management Models for Wireless Communication Network
Studies On Traffic Management Models for Wireless Communication Network
 
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
Security Mechanisms for Organic Mesh Networks - CAST Security Award 2007
 
Feature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic DetectionFeature Selection Strategies for HTTP Botnet Traffic Detection
Feature Selection Strategies for HTTP Botnet Traffic Detection
 
A machine consciousness approach to urban traffic signal control
A machine consciousness approach to urban traffic signal controlA machine consciousness approach to urban traffic signal control
A machine consciousness approach to urban traffic signal control
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
 
Paper(edited)
Paper(edited)Paper(edited)
Paper(edited)
 
Detection of Peer-to-Peer Botnets using Graph Mining
Detection of Peer-to-Peer Botnets using Graph MiningDetection of Peer-to-Peer Botnets using Graph Mining
Detection of Peer-to-Peer Botnets using Graph Mining
 
DETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MINING
DETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MININGDETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MINING
DETECTION OF PEER-TO-PEER BOTNETS USING GRAPH MINING
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Lightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFALightweight C&C based botnet detection using Aho-Corasick NFA
Lightweight C&C based botnet detection using Aho-Corasick NFA
 
Botnets behavioral patterns in the network. A Machine Learning study of botne...
Botnets behavioral patterns in the network. A Machine Learning study of botne...Botnets behavioral patterns in the network. A Machine Learning study of botne...
Botnets behavioral patterns in the network. A Machine Learning study of botne...
 
The DEBS Grand Challenge 2017
The DEBS Grand Challenge 2017The DEBS Grand Challenge 2017
The DEBS Grand Challenge 2017
 

More from Anant Narayanan

Enterprise Scale Knowledge Graphs
Enterprise Scale Knowledge GraphsEnterprise Scale Knowledge Graphs
Enterprise Scale Knowledge GraphsAnant Narayanan
 
Building an Intelligent Assistant
Building an Intelligent AssistantBuilding an Intelligent Assistant
Building an Intelligent AssistantAnant Narayanan
 
WebRTC: A Practical Introduction
WebRTC: A Practical IntroductionWebRTC: A Practical Introduction
WebRTC: A Practical IntroductionAnant Narayanan
 
Message Passing vs. Data Synchronization
Message Passing vs. Data SynchronizationMessage Passing vs. Data Synchronization
Message Passing vs. Data SynchronizationAnant Narayanan
 
Firebase: Tales from the Trenches
Firebase: Tales from the TrenchesFirebase: Tales from the Trenches
Firebase: Tales from the TrenchesAnant Narayanan
 
Error Handling in WebRTC
Error Handling in WebRTCError Handling in WebRTC
Error Handling in WebRTCAnant Narayanan
 
WebRTC: User Security & Privacy
WebRTC: User Security & PrivacyWebRTC: User Security & Privacy
WebRTC: User Security & PrivacyAnant Narayanan
 
Firefox Architecture Overview
Firefox Architecture OverviewFirefox Architecture Overview
Firefox Architecture OverviewAnant Narayanan
 
Next Generation Browser Add-Ons
Next Generation Browser Add-OnsNext Generation Browser Add-Ons
Next Generation Browser Add-OnsAnant Narayanan
 
An Overview of Distributed Debugging
An Overview of Distributed DebuggingAn Overview of Distributed Debugging
An Overview of Distributed DebuggingAnant Narayanan
 
Mozilla Weave: Integrating Services into the Browser
Mozilla Weave: Integrating Services into the BrowserMozilla Weave: Integrating Services into the Browser
Mozilla Weave: Integrating Services into the BrowserAnant Narayanan
 
Distributed File Systems: An Overview
Distributed File Systems: An OverviewDistributed File Systems: An Overview
Distributed File Systems: An OverviewAnant Narayanan
 
Innovating with Mozilla Labs
Innovating with Mozilla LabsInnovating with Mozilla Labs
Innovating with Mozilla LabsAnant Narayanan
 
Glendix: The Why and the How
Glendix: The Why and the HowGlendix: The Why and the How
Glendix: The Why and the HowAnant Narayanan
 

More from Anant Narayanan (20)

Enterprise Scale Knowledge Graphs
Enterprise Scale Knowledge GraphsEnterprise Scale Knowledge Graphs
Enterprise Scale Knowledge Graphs
 
Building an Intelligent Assistant
Building an Intelligent AssistantBuilding an Intelligent Assistant
Building an Intelligent Assistant
 
WebRTC: A Practical Introduction
WebRTC: A Practical IntroductionWebRTC: A Practical Introduction
WebRTC: A Practical Introduction
 
Message Passing vs. Data Synchronization
Message Passing vs. Data SynchronizationMessage Passing vs. Data Synchronization
Message Passing vs. Data Synchronization
 
Firebase: Tales from the Trenches
Firebase: Tales from the TrenchesFirebase: Tales from the Trenches
Firebase: Tales from the Trenches
 
WebRTC: An Overview
WebRTC: An OverviewWebRTC: An Overview
WebRTC: An Overview
 
Error Handling in WebRTC
Error Handling in WebRTCError Handling in WebRTC
Error Handling in WebRTC
 
WebRTC Demystified
WebRTC DemystifiedWebRTC Demystified
WebRTC Demystified
 
WebRTC: User Security & Privacy
WebRTC: User Security & PrivacyWebRTC: User Security & Privacy
WebRTC: User Security & Privacy
 
Firefox Architecture Overview
Firefox Architecture OverviewFirefox Architecture Overview
Firefox Architecture Overview
 
πP
πPπP
πP
 
Next Generation Browser Add-Ons
Next Generation Browser Add-OnsNext Generation Browser Add-Ons
Next Generation Browser Add-Ons
 
An Overview of Distributed Debugging
An Overview of Distributed DebuggingAn Overview of Distributed Debugging
An Overview of Distributed Debugging
 
Mozilla Weave: Integrating Services into the Browser
Mozilla Weave: Integrating Services into the BrowserMozilla Weave: Integrating Services into the Browser
Mozilla Weave: Integrating Services into the Browser
 
about:labs
about:labsabout:labs
about:labs
 
Distributed File Systems: An Overview
Distributed File Systems: An OverviewDistributed File Systems: An Overview
Distributed File Systems: An Overview
 
Innovating with Mozilla Labs
Innovating with Mozilla LabsInnovating with Mozilla Labs
Innovating with Mozilla Labs
 
Glendix: The Why and the How
Glendix: The Why and the HowGlendix: The Why and the How
Glendix: The Why and the How
 
Mozilla Prism
Mozilla PrismMozilla Prism
Mozilla Prism
 
Making Gentoo Tick
Making Gentoo TickMaking Gentoo Tick
Making Gentoo Tick
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Botnet Detection Techniques