NIST Workshop: The Technical Aspects of Botnets

Wednesday, May 16, 2012

Infosec Island Admin


While security risks on the Internet continue to exist in many areas, one increasingly exploited threat is the global rise of botnets.

A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access.  

To address the problems created by botnets, the botnet lifecycle must be disrupted and the malware on the devices removed or made impotent. Companies, organizations and governments around the world have been developing policies, high-level principles and solutions.

NIST seeks to engage all stakeholders to identify the available and needed technologies and tools to recognize, prevent, and remediate botnets; explore current and future efforts to develop botnet metrics and methodologies for measuring and reporting botnet metrics over time; and, understand where ecosystem stakeholders are in terms of roles and responsibilities.

Date: Wednesday, May 30, 2012

Location: 100 Bureau Dr. Gaithersburg, MD. 20899 (Building 101 - Green Auditorium)

Registration:  Online registration


Panel 1: Current and Future Efforts and Challenges

This panel will discuss the various efforts ongoing in this area. The panel will also address issues and challenges related to the prevention, detection, notification, and remediation of botnets. Panel members will discuss the impact of botnets, the characteristics and threats that make botnets a unique problem, and what it will take to effectively counter them. The panel will focus on the environment and ecosystem in which botnets function and the gaps in developing solutions.

Panel 2: Metrics, Measurements and Reporting

This panel will focus on opportunities and methods for measuring and reporting botnets. Panelists will examine what metrics work, how they should be reported, if they need to be standardized, where they should be employed, and the major challenges. The panel will discuss current and future efforts to develop metrics and potential methodologies for evaluating and reporting botnets over time.

Panel 3: Technologies, Tools, and Resources

This panel will explore the various technologies, tools and resources that are needed to effectively detect, prevent and remediate botnets. Panel members will examine their effectiveness, existing gaps or areas needing improvement, and those characteristics that make them most useful.

Panel 4: Roles and Responsibilities

The botnet ecosystem has many players. In this panel, government and private sector representatives will share their perspectives on what roles the various stakeholders (e.g. ISPs, browser providers, security firms, search engines, users, etc.) play and what their responsibilities are or could be. Panelists will discuss trends, gaps, and opportunities in the current environment.

Security Instructions:

Please note that there are now additional requirements for visitor vehicles entering the campus. When a Guest/Visitor checks in at the NIST Visitor Center at Gate A and intends to drive into the campus, they will have to show two documents: a Photo ID (State issued driver's license, Federal ID or passport) and a Vehicle Registration card. If a guest does not have a valid vehicle registration, they will be required to park at the Visitor Center and take the NIST Campus Shuttle. Visitors driving rental cars can show their rental agreement in lieu of vehicle registration.

Once you leave the Visitor Center, you will be asked to show the name badge you picked up and a photo ID before being admitted onto the campus.

The NIST Conference office coordinates security instructions with registered attendees directly.


Possibly Related Articles:
Viruses & Malware
Information Security
NIST malware Botnets Methodologies Training metrics Information Security Workshop
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.