botnets

botnets

botnets
Answer should be original and similarity (plagiarism) not more than 10% this is very very very important point.
Answer should be at least 800 words, Contain: Introduction, body and conclusion
Answer should be references on Harvard style (Not use Wikipedia), the references should be Academic Articles or books or Trusted website.
When use citation from any reference please keep it between "citation" (Author, Year).
As reference you can use the following book:
Jim Kurose & Keith Ross (2010), COMPUTER NETWORKING: A Top-Down Approach. 5th ed. Boston: Addison Wesley.
Assignment is:
1. Conduct research on botnets. What protocols and systems do attackers use to control and update botnets today?