Security Investigate

Botnet Command Detection Using Virtual Honeynet

Download now Free registration required

Executive Summary

Internet attacks are growing with time, threats are increasing to disable infrastructure to those that also target peoples and organization, these increasing large attacks, and the new class of attacks directly targets the large businesses and governments around the world. At the centre of many of these attacks is a large pool of compromised computers which are called zombies commonly controlled by the attackers by using some common channels? Attackers use these zombies as anonymous proxies to hide their real identities and amplify their attacks.

  • Format: PDF
  • Size: 1472.6 KB