Blog Posts Tagged with "Sinkholing"

B1c4090e84dcfac820a2b8ebe6eee82b

Leveraging Email Lists for Detecting Botnet IPs

March 04, 2012 Added by:Gianluca Stringhini

We propose a third way of performing botnet mitigation. Instead of learning different features to identify and attack the different botnets, we study how bots behave when sending spam, allow us to distinguish between bot infected machines and legitimate users...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sophisticated New Zeus Variants Continue to Propagate

February 24, 2012 Added by:Headlines

"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executables from other bots - every compromised computer is capable of providing data to the other bots..."

Comments  (0)