0 Members and 1 Guest are viewing this topic.
Email is consistently used to propagate malware, conduct phishing and deliver spam. A large proportion of this unwanted email is sent by compromised machines or computer zombies. This paper observes that computer zombies react differently to being greylisted, providing a method to profile computer zombies into various types. The GCIH course touches on the concept that this age is the “age of the botnets” and how malware is propagated with the help of email. This paper extends this topic by analysing greylisting activity for the purposes of identifying computer zombies and exploring methods to reduce the unwanted email received from botnets.