Map
Index
Random
Help
th

Quote: botnet software supports SYN flood, ICMP flood, HTTP flood, and denial of service configuration; update to maximize the similarity between attack trafic and normal traffic

QuoteRef: pengT4_2007 , p. 7



Topic:
security leaks and weaknesses
Topic:
limitations of system security

Quotation Skeleton

Generally, each type of botnet software contains a … A set of sophisticated configuration commands are provided … [denial of service] attack parameters, such as sending rate and packet size. Another … Hence, the botnet owner has the capability to … legitimate traffic.   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: security leaks and weaknesses (67 items)
Topic: limitations of system security (39 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.