¨More powerful than
Smurf attacks
¨No limitation on
number of machines used to launch
attack
¨No limitation on
bandwidth that can be consumed
¨Used against Amazon,
eBay, Etrade, and Zdnet in Feb 2000
¨ Before performing a DDOS flood, attack must take over a large number of victim machines (zombies) and install zombie software
¨Attacker
communicates with client machines which in turn
send commands to zombies