Lee, Christopher Patrick - 2009
Internet-connected computers. They use this network of controlled computers to flood networks with traffic from multiple … a closed network and to rapidly implement new communication, spreading, control, and attack mechanisms for study. This …, and periodic updates.Our approach implements the key network features from existing botnets and provides the required …