1 00:00:00,520 --> 00:00:07,090 How does a deadly US attack works now as attacks are carried out with networks of Internet connected 2 00:00:07,090 --> 00:00:07,540 machines? 3 00:00:08,230 --> 00:00:14,140 These network consist of computers and other devices, such as Iot devices which have been infected 4 00:00:14,140 --> 00:00:18,150 with a malware allowing them to be controlled remotely by an attacker. 5 00:00:18,400 --> 00:00:26,200 And these individual devices are referred to as bots or zombies and a group of what is called a botnet. 6 00:00:26,470 --> 00:00:29,040 Don't worry, we will talk about putting it in details. 7 00:00:29,710 --> 00:00:36,100 Now, once a unit has been established, the attacker is able to direct an attack by sending remote 8 00:00:36,100 --> 00:00:37,840 instructions to each bot. 9 00:00:38,350 --> 00:00:45,160 So when a victim, server or network is targeted by the botnet, each book sends request to the target 10 00:00:45,160 --> 00:00:52,090 IP addresses, potentially causing the server or network to become overwhelmed, resulting in denial 11 00:00:52,090 --> 00:00:53,590 of service to normal traffic. 12 00:00:54,500 --> 00:01:00,470 Because each what is legitimate internal device separating the attack, traffic from normal traffic 13 00:01:00,470 --> 00:01:01,430 can be difficult. 14 00:01:01,700 --> 00:01:02,290 Why is that? 15 00:01:02,300 --> 00:01:07,830 Because these are normal devices and maybe they are normal users, by the way. 16 00:01:08,270 --> 00:01:12,260 So how to distinguish between normal traffic and they do traffic? 17 00:01:12,740 --> 00:01:16,640 It is very hard when actually there are a lot of ways, but. 18 00:01:17,580 --> 00:01:19,710 It is not 100 percent accurate. 19 00:01:20,100 --> 00:01:23,190 OK, we will see them in the next lecture's.