A botnet is an army of compromised machines, also known as "zombies," that are under the command and control of a single "botmaster." The rise of consumer broadband has greatly increased the power of botnets to launch crippling denial of service (DoS) attacks on servers, infect millions of computers with spyware and other malicious code, steal identity data, send out vast quantities of spam, and engage in click fraud, blackmail, and extortion.
Botnets are the primary security threat on the Internet today. It is easy to commission botnet attack services and hackers are quicker than ever to exploit new vulnerabilities. Tens of thousands of machines are typically part of a single botnet. Botnets are hard to detect because they are highly dynamic in nature, adapting their behavior to evade the most common security defenses.
IT security teams must prevent corporate devices from becoming part of a botnet and protect corporate resources from botnet attacks. This white paper discusses the typical lifecycle of a botnet, the damage caused by botnet attacks, and the most effective detection and mitigation techniques. It then discusses solutions available through Cisco®.
Vendors (Listed Alphabetically):
Advertising Info |
Contact Us |
Submit a White Paper