Skip to Content
Cyber Security Essentials
book

Cyber Security Essentials

by James Graham, Ryan Olson, Rick Howard
April 2016
Beginner content levelBeginner
342 pages
9h 51m
English
Auerbach Publications
Content preview from Cyber Security Essentials
110 Cyber seCurity essentiAls
with IP addresses of infected computers and continuously cycle new
IP addresses. Client requests for a single-flux domain received by
the domain’s name server are resolved to multiple bots (bots 1–8
in Exhibit 2-16). All requests to the domain go through infected
computers to the mothership. Acting similar to a reverse proxy, the
infected computers receive the mothership’s response to the client’s
initial request and forward it to the client. Multiple other variations
of fast-flux currently exist, and all incorporate the same techniques
with different levels of complexity. Double-flux adds a second layer
of complexity by cycling IP addresses to name servers, and hydra-
flux introduces multiple motherships.
48
Regardles ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Security, 2nd Edition

Cyber Security, 2nd Edition

David Sutton
Cybersecurity Essentials

Cybersecurity Essentials

Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
Introduction to Computer Networks and Cybersecurity

Introduction to Computer Networks and Cybersecurity

Chwan-Hwa (John) Wu, J. David Irwin

Publisher Resources

ISBN: 9781439851265