please answer all with examples without copy pasting. wrong answers… please answer all with examples without copy pasting. wrong answers w
please answer all with examples without copy pasting. wrong answers… please answer all with examples without copy pasting. wrong answers will be reported Consider the utilization of Twitter for botnet order and-control. Expect an improved on variant of Twitter that functions as follows: (1) clients register accounts, which requires tacklinga CAPTCHA; (2) once enrolled, clients can post (many) short messages, named tweets;(3) client A can follow client B so that A gets duplicates of B’s tweets; (4) client B can tellat the point when client A has chosen to follow client B; (5) from the Twitter landing page, anybody canview a little arbitrary example (0.1%) of ongoing tweets.(a) Sketch how a botmaster could structure a botnet to utilize Twitterfor C&C. Be clear in what activities the various gatherings (individual bots, botmaster)take. Expect that there is no concern of guarded countermeasures.(b) (12 focuses) Briefly depict a technique that Twitter could use to identify botnets utilizingthis C&C conspire.(c) (6 focuses) How well will this discovery technique for Twitter strategy work?(d) (6 focuses) Briefly talk about a modified plan that the botmaster could utilize to stand up tothis location by Twitter. Computer Science Engineering & Technology Information Security INFORMATIO ICS 2100 Share QuestionEmailCopy link


