Commit befor pushing

This commit is contained in:
Valentin Brandl 2021-10-18 12:59:29 +02:00
parent 1e06486593
commit 96924f246b
12 changed files with 206 additions and 30 deletions

5
.gitignore vendored
View File

@ -1,15 +1,18 @@
_minted-paper/ _minted-paper/
*.acr
*.aux *.aux
*.bbl *.bbl
*.bcf *.bcf
*.blg *.blg
*.fdb_latexmk *.fdb_latexmk
*.fls *.fls
*.lof
*.log *.log
*.out *.out
*.pdf *.pdf
*.run.xml *.run.xml
*.toc
result result
#!cv.pdf !report.pdf

View File

@ -1,6 +1,6 @@
# use bash so process substutution is available # use bash so process substutution is available
SHELL = bash SHELL = bash
SRC = main.tex SRC = report.tex
TARGET = $(SRC:%.tex=%.pdf) TARGET = $(SRC:%.tex=%.pdf)
.PHONY: build .PHONY: build

5
abstract.tex Normal file
View File

@ -0,0 +1,5 @@
\begin{abstract}
Foo Bar baz lel
\end{abstract}
% vim: set filetype=tex ts=2 sw=2 tw=0 et :

View File

@ -2,3 +2,35 @@
short = HTML, short = HTML,
long = hyper text markup language long = hyper text markup language
} }
\DeclareAcronym{p2p}{
short = {{P2P}},
long = {{peer-to-peer}}
}
\DeclareAcronym{c2}{
short = {{C2 server}},
long = {{command and control server}}
}
\DeclareAcronym{irc}{
short = {{IRC}},
long = {{internet relay chat}}
}
\DeclareAcronym{http}{
short = {{HTTP}},
long = {{hypertext transfer protocol}}
}
\DeclareAcronym{ddos}{
short = {{DDoS}},
long = {{distributed denial of service}}
}
\DeclareAcronym{dga}{
short = {{DGA}},
long = {{domain generation algorithm}}
}
% vim: set filetype=tex ts=2 sw=2 tw=0 et :

20
appendix.tex Normal file
View File

@ -0,0 +1,20 @@
\appendix
% TODO: add to table of contents?
\printbibliography
\clearpage
% TODO: add to table of contents?
\listoffigures
\clearpage
% TODO: add to table of contents?
\printacronyms
\clearpage
\makedeclaration
% vim: set filetype=tex ts=2 sw=2 tw=0 et :

9
bibliography.bib Normal file
View File

@ -0,0 +1,9 @@
@article{bib:persistentstruct,
author = {James R Driscoll and Neil Sarnak and Daniel D. Sleator and Robert E. Tarjan},
title = {Making Data Structures Persistent},
journal = {Journal of Computer and System Sciences},
year = {1989},
month = {02},
volume = {Vol. 38, No. 1},
pages = {86-124}
}

1
commands.tex Normal file
View File

@ -0,0 +1 @@
\newcommand{\eg}{\textit{e}.\textit{g}.}

58
content.tex Normal file
View File

@ -0,0 +1,58 @@
% \section{Testeroo ma man}
% \OfficialLogoNormal
% \logoNormal
% \textcolor{Accent}{foo lol fakultätsfarben}
% jo moin~\cite[121]{bib:persistentstruct}
% \Ac{html}
% \ac{html}
% \enquote{look ma, imma quote}~\ref{fig:some_figure}
% \begin{figure}[h]
% \OfficialLogoNormal
% \caption{OTH Logo}
% \label{fig:some_figure}
% \end{figure}
% asdft~\footfullcite[pre][post]{bib:persistentstruct}
% \textsc{Small Caps test Abschnitt}
% \subsection{Sub 1}
% \subsection{Sub 2}
% \subsubsection{Subsub 1}
% ich bin ein text mit fußnote\footnote{lol ich bin eine fußnote}
\section{Introduction}
% TODO: what is a bot? Infected systems. Malware. DGA, beispiele, tree vs graph
A botnet describes a network of connected computers with some way to control the infected systems.
In classic botnets, there are one or more central coordinating hosts called \acp{c2}.
These \acp{c2} could use anything from \ac{irc} over \ac{http} to Twitter to communicate with the infected systems.
The infected systems can be abused for a number of things, \eg{} \ac{ddos} attacks, stealing data from victims, as proxies to hide the attackers identity, send spam emails \dots{}
Analyzing and shutting down a centralized botnet is comparatively easily since every bot knows the IP address, domain name, Twitter handle, \ac{irc} channel \dots{} the \acp{c2} are using.
% TODO: wort für polizei
A targeted operation with help from TODO, hosting providers, domain registrars and platform providers could shut down or take over the operation by changing how requests are rooted or simply shutting down the controlling servers/accounts.
% TODO: too informal?
A number of botnet operations were shut down like this and as the defenders upped their game, so did attackers --- the idea of \ac{p2p} botnets came up.
The idea is to build a decentralized network without single points of failure where the \acp{c2} are.
In a \ac{p2p} botnet, each node in the network knows a number of it's neighbours and connects to those, each of these neighbours has a list of neighbours on his own, and so on.
% vim: set filetype=tex ts=2 sw=2 tw=0 et spell :

20
metadata.tex Normal file
View File

@ -0,0 +1,20 @@
\title{Organized Crawling of P2P Botnets}
\author{Valentin Brandl}
\documenttype{Masterthesis}
\studentid{3220018}
\department{Informatik und Mathematik}
\studyprogramme{Master Informatik}
%\startingdate{1.\,November 2088}
%\closingdate{11.\,Dezember 2089}
\firstadvisor{Prof. Dr. Christoph Skornia}
%\secondadvisor{Prof. Dr. Petra Hart}
%\externaladvisor{Dr. Klara Endlos}
\date{\today}
% \date{}
% vim: set filetype=tex ts=2 sw=2 tw=0 et :

BIN
report.pdf Normal file

Binary file not shown.

View File

@ -7,52 +7,73 @@
\WarningFilter{latexfont}{Font} \WarningFilter{latexfont}{Font}
\WarningFilter{latexfont}{Some font shapes} \WarningFilter{latexfont}{Some font shapes}
\documentclass[11pt]{diazessay} % \documentclass[11pt]{diazessay}
\documentclass[a4paper,
DIV=13,
12pt,
BCOR=10mm,
department=FakIM,
% lucida,
% KeepRoman,
oneside,
parskip=half,
automark,
headsepline,
% footsepline,
]{OTHRartcl}
% document language % document language and hyphenation
% \usepackage[ngerman]{babel} \usepackage[english]{babel}
% UTF-8 encoding % UTF-8 encoding
\usepackage[utf8]{inputenc} \usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc} \usepackage[T1]{fontenc}
\usepackage{lmodern} \usepackage{lmodern}
% acronyms
\usepackage{acro}
\include{acronyms}
% language specific quotes % language specific quotes
\usepackage{csquotes} \usepackage{csquotes}
\usepackage{needspace} % bibliography
\usepackage[backend=biber]{biblatex}
\addbibresource{bibliography.bib}
% OTH specific commands for logos, colors
\usepackage{OTHR}
% line spacing
\usepackage[onehalfspacing]{setspace}
% hyperlinks
\usepackage[pdftex,colorlinks=false]{hyperref}
% make overfull hbox warnings prominently visible in document % make overfull hbox warnings prominently visible in document
\overfullrule=2cm \overfullrule=2cm
% \usepackage[scale=0.75]{geometry} \pagestyle{headings}
% metadata like title, author, supervisor, ...
\title{\textbf{Main Title} \\ {\Large\itshape Subtitle}} \include{metadata}
% custom commands
\author{Valentin Brandl} \include{commands}
% \date{\today}
\date{}
\begin{document} \begin{document}
\maketitle \maketitle
\begin{abstract} \include{abstract}
Foo Bar baz lel
\end{abstract}
\hspace*{3.6mm}\textit{Keywords:} foo, bar, baz, trololol \tableofcontents
\vspace{30pt} \include{content}
\section*{Once upon a time} \cleardoublepage
\section*{Once upon a time}
\include{appendix}
\end{document} \end{document}
% vim: set filetype=tex ts=2 sw=2 tw=0 et : % vim: set filetype=tex ts=2 sw=2 tw=0 et :

View File

@ -9,15 +9,21 @@ let
# base packages # base packages
scheme-small scheme-small
acro
anyfontsize
biblatex
csquotes csquotes
dejavu
latexmk latexmk
moderncv # moderncv
needspace # needspace
fontawesome # fontawesome
fontspec
silence silence
wrapfig translations
enumitem # wrapfig
mathpazo # enumitem
# mathpazo
; ;
}; };
@ -27,6 +33,7 @@ pkgs.mkShell {
buildInputs = [ buildInputs = [
latexPackage latexPackage
pkgs.biber
# language correction # language correction
pkgs.languagetool pkgs.languagetool
# detex script # detex script