An attacker instructs bots to use camouflage mechanism to hide his phishing and malware delivery locations in the rapidly changing network of compromised bots. In this particular technique, a single domain name consists of multiple IP addresses.
Which of the following technique is used by the attacker?
Broderick
4 months agoMarcos
4 months agoCarlota
4 months agoGracia
4 months agoCaprice
5 months agoTiffiny
5 months agoDeonna
5 months agoOdette
5 months agoVernice
5 months agoMary
5 months agoOllie
5 months agoGeraldine
5 months agoLavonna
5 months agoEmelda
5 months agoRodney
5 months ago