60.2k views
4 votes
Ben's monitoring detects regular traffic sent from a system that is suspected to be compromised and participating in a botnet to a set of remote IP addresses. What is this called?

A. Anomalous pings
B. Probing
C. Zombie chatter
D. Beaconing

User Guli
by
8.0k points

1 Answer

1 vote

Final answer:

In the context of cyber security, the regular traffic from a compromised system to a botnet's remote IP addresses is known as beaconing. Beaconing is used for communication with command and control servers for various malicious purposes.

Step-by-step explanation:

When Ben's monitoring detects regular traffic sent from a system that is suspected to be compromised and participating in a botnet to a set of remote IP addresses, this activity is referred to as beaconing. Beaconing is a common method that compromised systems use to communicate with command and control (C&C) servers operated by attackers. These communications can serve multiple purposes, including receiving updates or commands, exfiltrating data, or signaling the presence of the compromised machine within the botnet. Beaconing can be identified by the regular, systematic, and often hidden or obfuscated transmissions between the infected device and the attacker's control infrastructure.

User Tomuke
by
7.9k points