A study conducted by Cisco identifies most common detection and mitigation techniques of the Botnet. The study indicates, Botnet creation begins with the download of a software program called a "bot" (for example, IRCBot, SGBot, or AgoBot) along with an embedded exploit (or
payload) by an unsuspecting user, who might click an infected e-mail attachment or download infected files or freeware...
By IT NEXT