Botnets: big and bigger

作者: B. McCarty

DOI: 10.1109/MSECP.2003.1219079

关键词:

摘要: Researchers design honeynet computer networks specifically to be attacked. The hosts that comprise a and serve as attack targets are called honeypots. configure them capture variety of useful data about attacks without compromising other computers. Moreover, researchers strive implement control in such way intruders unaware their actions being monitored. Although technology is relatively new, it developing rapidly. Honeynets have already proven themselves sources information. In this article, I'll describe an on honeypot occurred March 2003 during the onset peak activity several worms targeted vulnerable running Windows file sharing. We incorporated compromised into large botnet attackers used initiate distributed denial-of-service (DDOS) against Internet sites. I explain structure botnets, use by attackers, threat they pose

参考文章(1)
L. Spitzner, The Honeynet Project: trapping the hackers ieee symposium on security and privacy. ,vol. 1, pp. 15- 23 ,(2003) , 10.1109/MSECP.2003.1193207