Which of the following techniques is used to identify attacks originating from a botnet?
Recipient filtering
BPF-based filter
IFilter
Passive OS fingerprinting
Submit