Botnet Command Detection Using Virtual Honeynet

Internet attacks are growing with time, threats are increasing to disable infrastructure to those that also target peoples and organization, these increasing large attacks, and the new class of attacks directly targets the large businesses and governments around the world. At the centre of many of these attacks is a large pool of compromised computers which are called zombies commonly controlled by the attackers by using some common channels? Attackers use these zombies as anonymous proxies to hide their real identities and amplify their attacks.

Provided by: Academy & Industry Research Collaboration Center Topic: Security Date Added: Sep 2011 Format: PDF

Find By Topic