Detecting and Containing IRC-Controlled Trojans: When Firewalls, AV, and IDS Are Not Enough