The idea is to enumerate the state of the art in detecting malware command & control traffic. Do silver bullets exist? Any well-hidden gems? Why are we not seeing products making use of previous research? Are there methods that actually work? Is the code available? Can we reproduce any positive results?
- Improve project plan
- Find and list suitable papers, conference presentations & proceedings etc.
- Filter out the promising ones
- Identify proposed methods and possible results, consider reproducibility
- Present findings as a table
- Reproduce / test some methods against available test datasets
- Possibly produce test datasets without private information
- Write the thesis
- Keywords: ???
- Proceedings from: FloCon, ???
- Paper 1, link
- Paper 2
...