August 2019
Intermediate to advanced
342 pages
9h 35m
English
In order to promptly identify the possible presence of a botnet, it may be useful to consider its kill chain (the different phases that characterize its realization).
We can, therefore, distinguish the following phases:
Among the events to constantly monitor for the possible presence of a botnet, the connections made at regular intervals to remote hosts should be included. Rather than monitoring the quality of the traffic itself (very often, in fact, botnets make use of apparently harmless communication protocols, such as HTTP traffic, using the service's default port 80, in order to mask its presence within the logs files), ...
Read now
Unlock full access