July 2014
Intermediate to advanced
306 pages
10h 32m
English
Giovanni Bottazzi; Gianluigi Me
One of the most insidious cyber threats for security community is represented today by the diffusion of infected computers (bots or zombies) representing a part of a completely managed network (botnet). The use of botnets is very frequent to target attacks, such as a DDoS or cyber-espionage campaigns and their managers try to involve the largest number of machines, hiding the activities of the malicious architecture.
This chapter focuses on the implemented architecture, the network protocol used or the technology of the botnet, although multiple different classifications appear on the literature: the aforementioned ...
Read now
Unlock full access