Use honeypots to track and mitigate botnets
Source: Addison Wesley Professional
Bots pose a serious threat to both individual and corporate environments. They are often used for DDoS attacks, to send spam, and as spyware to steal sensitive information from the victim's machine. In this chapter download from Virtual HoneyPots: From Botnet Tracking to Intrusion Detection, learn how to track and defend your network and computer systems from botnets. First, learn what bots and botnets are. Then, learn how to use honeypots to collect information related to a botnet. Finally, learn some key strategies for botnet mitigation.
Title: Virtual HoneyPots: From Botnet Tracking to Intrusion Detection
Author: Niels Provos, Thorsten Holz
Publisher: Addison Wesley Professional
Chapter 11: Tracking Botnets
ISBN: 0-321-33632-1; Copyright 2008 Addison Wesley Professional. All rights reserved.
Used with permission from the publisher. Available from booksellers or direct from Addison Wesley Professional