Four Handy botnet detection tools and techniques : A tutorial

Recently, my 3rd article got published in a security portal – searchsecurity.techtarget.in.

An overview:

It’s essential to know the difference between a bot and botnet before you can identify suitable botnet detection techniques and tools. While an autonomous program automatically performing tasks in the absence of a real user is known as a bot, a network of autonomous programs capable of acting on instructions is known as botnet. A few examplesof botnets include: Storm, Kraken, Conficker and Zeus, among others.

As botnets continue to gain momentum in the form of spam bots, click fraud, large-scale identity thefts and proxy nets and a large-scale distributed denial of service (DDoS) attacks, it’s proving to be a challenge to defend against these intrusive autonomous programs. Generally, a botnet may display following behavior patterns like signature-based, anomaly-based, DNS-based and mining-based. This tip discusses how to effectively use various botnet detection techniques and tools.

For the full article : Kindly click on the link below

http://searchsecurity.techtarget.in/tip/Four-handy-botnet-detection-techniques-and-tools-A-tutorial

Thank You

3ps!l0nlAmBdA

Posted on June 7, 2011, in Uncategorized. Bookmark the permalink. 1 Comment.

  1. I have been browsing online more than 3 hours today, yet I never found
    any interesting article like yours. It is pretty worth enough
    for me. Personally, if all website owners and bloggers made good content as you did, the net will be a
    lot more useful than ever before.

Leave a comment