Four Handy botnet detection tools and techniques : A tutorial
Recently, my 3rd article got published in a security portal – searchsecurity.techtarget.in.
An overview:
It’s essential to know the difference between a bot and botnet before you can identify suitable botnet detection techniques and tools. While an autonomous program automatically performing tasks in the absence of a real user is known as a bot, a network of autonomous programs capable of acting on instructions is known as botnet. A few examplesof botnets include: Storm, Kraken, Conficker and Zeus, among others.
As botnets continue to gain momentum in the form of spam bots, click fraud, large-scale identity thefts and proxy nets and a large-scale distributed denial of service (DDoS) attacks, it’s proving to be a challenge to defend against these intrusive autonomous programs. Generally, a botnet may display following behavior patterns like signature-based, anomaly-based, DNS-based and mining-based. This tip discusses how to effectively use various botnet detection techniques and tools.
For the full article : Kindly click on the link below
http://searchsecurity.techtarget.in/tip/Four-handy-botnet-detection-techniques-and-tools-A-tutorial
Thank You
3ps!l0nlAmBdA
Posted on June 7, 2011, in Uncategorized. Bookmark the permalink. 1 Comment.
I have been browsing online more than 3 hours today, yet I never found
any interesting article like yours. It is pretty worth enough
for me. Personally, if all website owners and bloggers made good content as you did, the net will be a
lot more useful than ever before.