A major security challenge on the Internet is the existence of the large number of compromised machines. Such machines have been increasingly used to launch various security attacks including DDoS, spamming, and identity theft. Two natures of the compromised machines on the Internet sheer volume and wide spread—render many existing security Countermeasures less effective and defending attacks involving compromised machines extremely hard. On the other hand, identifying and cleaning...
Topics: Spam Zombies, Compromised Machines, Botnet, Spot Filter