427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet339/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   335   336   337   338   339   340   341   342   ...   387
Bog'liq
Botnets - The killer web applications

Solutions Fast Track
Identifying the Information an 
Enterprise/University Should Try to Gather
Log files from firewalls, scans, and other sources on your network can
provide the first indications that a botnet resides on computers.They
www.syngress.com
Intelligence Resources • Chapter 11
411
427_Botnet_11.qxd 1/9/07 9:56 AM Page 411


can be a valuable source of information, and be used as evidence in
possible criminal investigations or civil suits against an attacker.
Copies of spam being sent by the botnet, files stored by the botnet,
and even the hard disk itself may be useful as evidence and provide
information on what the botnet is doing with hosts on your
network.
Tools like disassemblers can be used to disassemble a botnet and view
its code. Using these tools, you can find a significant amount of
intelligence regarding the botnet, including how it works, what it
accesses, and who it’s communicating with.
Places/Organizations Where 
Public Information Can Be Found
Numerous organizations and sites on the Internet provide
information on botnets that have been active on the Internet.These
include vendors that manufacture tools to safeguard systems or
remove viruses and malware, security sites that provide information,
mailing lists, and discussion groups.
Sites that provide antivirus, antimalware, and antispyware tools often
provide additional information on known botnets. Information
includes proper removal procedures, how the botnet works, and its
purpose or functions.
Public organizations provide whitepapers, articles, statistics, and other
information that can aid in protecting systems, and understanding the
threat botnets pose.They often provide additional methods of
discussing botnets with other security professionals and those who are
dealing or have dealt with botnet problems.
Membership Organizations and How to Qualify
Some organizations require incumbents to meet specific criteria
before membership is given.The requirements may include working
in a specific field, for a certain type of organization (such as a

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   335   336   337   338   339   340   341   342   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish