Computer Networking : A Top-Down Approach

Computer Networking : A Top-down Approach

Authors: James F. Kurose, Keith W. Ross
ISBN: 9780132856201
Edition: 6
Chapter: Computer Networks And The Internet
Exercise: Review
Question: 27


Question by Anonymous on 08 May, 2016 at 08:18 AM

Describe how a botnet can be created, and how it can be used for a DDoS attack.

Answer by Geroge on 08 May, 2016 at 08:18 AM

The following steps to create a botnet:

  • Prepare host systems to find the vulnerability attacker tries.
  • Using the Trojan to fight against attackers or compromises the host system.
  • This process is called botnet.

DDoS attack:

  • DDoS means Distributed Denial-of-Service.
  • The host systems can scan the environment and control the systems from the attacker.


0 0


Post the discussion improve the above solution.