Fast Flux

Fast flux is a DNS technique used by botnets, with the location of the Web servers can be disguised. This is handled with a DNS server and a load distribution via DNS (Round - Robin DNS). Usually fast flux networks in phishing and DoS attacks are used.

Single - Flux

The simplest kind of fast flux, also called single -flux is characterized by multiple individual nodes, which can turn on and unsubscribe your address in the DNS A-record a single domain itself. This combined round robin DNS with a very short time to live (TTL ) to create constantly changing end addresses for the individual domains. This list may be hundreds or thousands of entries long.

Double - Flux

A more sophisticated type of fast flux reversal, which is also called double flux is characterized by multiple nodes, which can independently and in sign out for the DNS zone again their address into a portion of the DNS NS records. This creates an additional layer of redundancy and survival within the malware network.

Reverse Proxy

Use the botnet operators for their fast-flux networks reverse proxy which usually come from our own botnet. Only those who have a fast Internet connection and extra-long online is received in a fast-flux network.

A reverse proxy is a communication interface which is connected in front of a server and listen on its location on the HTTP port. It has three possible objectives:

Examples of fast-flux botnets

327241
de