P2P Botnets, Following the Network Trail

To increase botnet resiliency, threat actors are now using a hybrid model, rather than a pure peer-to-peer one. In a P2P hybrid network topology, the botnet can survive a takedown of nodes with specialized roles, and reorganize itself accordingly.

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets, but there are proven strategies that can be followed when a specific network has been affected.

Watch this webinar to learn about:

  • How P2P/hybrid botnets operate
  • Spotting P2P/hybrid botnet infections on your network
  • Effective ways to disrupt botnets

Speakers

P2P Botnets, Following the Network Trail
Webinar

P2P Botnets, Following the Network Trail

November 4, 2020

To increase botnet resiliency, threat actors are now using a hybrid model, rather than a pure peer-to-peer one. In a P2P hybrid network topology, the botnet can survive a takedown of nodes with specialized roles, and reorganize itself accordingly.

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets, but there are proven strategies that can be followed when a specific network has been affected.

Watch this webinar to learn about:

  • How P2P/hybrid botnets operate
  • Spotting P2P/hybrid botnet infections on your network
  • Effective ways to disrupt botnets

To increase botnet resiliency, threat actors are now using a hybrid model, rather than a pure peer-to-peer one. In a P2P hybrid network topology, the botnet can survive a takedown of nodes with specialized roles, and reorganize itself accordingly.

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets, but there are proven strategies that can be followed when a specific network has been affected.

Watch this webinar to learn about:

  • How P2P/hybrid botnets operate
  • Spotting P2P/hybrid botnet infections on your network
  • Effective ways to disrupt botnets

SPEAKERS

To increase botnet resiliency, threat actors are now using a hybrid model, rather than a pure peer-to-peer one. In a P2P hybrid network topology, the botnet can survive a takedown of nodes with specialized roles, and reorganize itself accordingly.

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets, but there are proven strategies that can be followed when a specific network has been affected.

Watch this webinar to learn about:

  • How P2P/hybrid botnets operate
  • Spotting P2P/hybrid botnet infections on your network
  • Effective ways to disrupt botnets

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

P2P Botnets, Following the Network Trail

To increase botnet resiliency, threat actors are now using a hybrid model, rather than a pure peer-to-peer one. In a P2P hybrid network topology, the botnet can survive a takedown of nodes with specialized roles, and reorganize itself accordingly.

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets, but there are proven strategies that can be followed when a specific network has been affected.

Watch this webinar to learn about:

  • How P2P/hybrid botnets operate
  • Spotting P2P/hybrid botnet infections on your network
  • Effective ways to disrupt botnets

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.