If you have any trouble accessing any of these materials, please post a note on Piazza and we'll help.
- Slides: all animations, limited animations
- Outline
- Recording
- No supplemental reading for this lecture
- Explain (at a high-level) how a machine becomes part of a bot in a botnet
- Compare/contrast the two different types of NIDS
- Explain a variety of ways to mount DDoS attacks (e.g., syn floods, DNS amplification); identify what resource is exhausted in each attack (e.g., the network, storage, etc.)