Diagram 2 - Distributed Denial of Service (DDoS) attack

 

(Author's work)




The diagram indicates how DDoS attacks occur. It starts with building the botnet by utilization a vulnerability in a system, called the DDoS master to infect it with malware. Subsequently, the DDoS master will start spreading the malware, and in this phase, other vulnerable devices will be infected to make them join the botnet. Then, the infected devices will spread the malware. However, the number of devices in a botnet can be extremely high. Once the attacker intends to launch the attack toward the victim, the number of attack traffic from the botnet will be known (ruggedtooling,2018).








Reference:


RUGGEDTOOLING(2018) What are DDoS attacks?. [Online] RUGGEDTOOLING. Available from: What are DDoS attacks? - Rugged Tooling  [Accessed 28/05/21].

0 Comments