Which of the following techniques is used to identify attacks originating from a botnet?
BPF-based filter
Recipient filtering
IFilter
Passive OS fingerprinting
Submit