Author:Yanlong Ma,Lingming Tu,Genshen Ye,Hongda Liu
When we talk about DDos botnet, we tend to think the typical scenario, some mediocre, code-borrowing scripts target old vulnerabilities. But things actually have started to change, we noticed more and more attackers beginning to use 0-day vulnerabilities.
Background
Starting from