Blog Posts Tagged with "Sinkholing"


Leveraging Email Lists for Detecting Botnet IPs

March 04, 2012 Added by:Gianluca Stringhini

We propose a third way of performing botnet mitigation. Instead of learning different features to identify and attack the different botnets, we study how bots behave when sending spam, allow us to distinguish between bot infected machines and legitimate users...

Comments  (0)


Sophisticated New Zeus Variants Continue to Propagate

February 24, 2012 Added by:Headlines

"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executables from other bots - every compromised computer is capable of providing data to the other bots..."

Comments  (0)