{"id":3074,"date":"2014-03-05T09:29:37","date_gmt":"2014-03-05T16:29:37","guid":{"rendered":"https:\/\/www.bluehost.com\/blog\/?p=3074"},"modified":"2014-03-05T09:29:37","modified_gmt":"2014-03-05T16:29:37","slug":"zombie-attack-infographic","status":"publish","type":"post","link":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/","title":{"rendered":"Zombie DDos Attack (Infographic)"},"content":{"rendered":"\n<p>As the pace of business grows, so too does the sophistication of digital crime. The interconnected world is not without its challenges, and among them, the ability for coordinated criminals to take down business networks and digital infrastructure poses particular concern.<br>As a business, your up-time is your lifeblood, and stemming the flow of intrusion is vital to keeping your staff and your customers working at full capacity. Here&#8217;s a look at how organized networks of &#8220;zombie computers&#8221; can damage your IT infrastructure, and how to select the right webhost to keep your network safe.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"\/blog\/wp-content\/uploads\/2014\/02\/the-zombie-computer-the-scary-story-behind-ddos-attacks-and-botnets-infographic.png\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/the-zombie-computer-the-scary-story-behind-ddos-attacks-and-botnets-infographic.png\" alt=\"The Zombie Computer\" class=\"wp-image-3075\"\/><\/a><\/figure><\/div>\n\n\n\n<p>To embed this infographic on your own website or blog, copy the code below:<br><textarea cols=\"75\" rows=\"4\">&lt;i&gt;Click image to see a larger version&lt;\/i&gt;&lt;\/br&gt;&lt;a href=&#8221;https:\/\/www.bluehost.com\/blog\/educational\/zombie-computer-infographic-3074&#8243;&gt;&lt;img alt=&#8221;The Zombie Computer Infographic&#8221; src=&#8221;\/blog\/wp-content\/uploads\/2014\/02\/the-zombie-computer-the-scary-story-behind-ddos-attacks-and-botnets-infographic.png&#8221; width=&#8221;540&#8243; \/&gt;The Zombie Computer Infographic&lt;\/a&gt; via &lt;a href=&#8221;http:\/\/www.bluehost.com&#8221;&gt;Bluehost&lt;\/a&gt;<\/textarea><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the pace of business grows, so too does the sophistication of digital crime. The interconnected world is not without its challenges, and among them, the ability for coordinated criminals to take down business networks and digital infrastructure poses particular concern.As a business, your up-time is your lifeblood, and stemming the flow of intrusion is [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3275,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_title":"Zombie DDos Attack (Infographic)","_yoast_wpseo_metadesc":"In the following infographic, we'll provide a step-by-step outline that details what actually happens during a DDoS attack.","inline_featured_image":false,"footnotes":""},"categories":[3052,10],"tags":[3311,3320,3331,3334],"ppma_author":[598],"class_list":["post-3074","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content-marketing","category-marketing","tag-analytics","tag-content","tag-listicle","tag-seasonal"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zombie DDos Attack (Infographic)<\/title>\n<meta name=\"description\" content=\"In the following infographic, we&#039;ll provide a step-by-step outline that details what actually happens during a DDoS attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/3074\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zombie DDos Attack (Infographic)\" \/>\n<meta property=\"og:description\" content=\"In the following infographic, we&#039;ll provide a step-by-step outline that details what actually happens during a DDoS attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/\" \/>\n<meta property=\"og:site_name\" content=\"Bluehost Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bluehost\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-05T16:29:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brittany Warnock\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bluehost\" \/>\n<meta name=\"twitter:site\" content=\"@bluehost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brittany Warnock\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/\"},\"author\":{\"name\":\"Brittany Warnock\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/c2ee0d64431b62e70e386eaa4941e7c3\"},\"headline\":\"Zombie DDos Attack (Infographic)\",\"datePublished\":\"2014-03-05T16:29:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/\"},\"wordCount\":176,\"publisher\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png\",\"keywords\":[\"Analytics\",\"Content\",\"Listicle\",\"Seasonal\"],\"articleSection\":[\"Content Marketing\",\"Marketing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/\",\"url\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/\",\"name\":\"Zombie DDos Attack (Infographic)\",\"isPartOf\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png\",\"datePublished\":\"2014-03-05T16:29:37+00:00\",\"description\":\"In the following infographic, we'll provide a step-by-step outline that details what actually happens during a DDoS attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage\",\"url\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png\",\"contentUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png\",\"width\":1800,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bluehost.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uncategorized\",\"item\":\"https:\/\/www.bluehost.com\/blog\/category\/uncategorized\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zombie DDos Attack (Infographic)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#website\",\"url\":\"https:\/\/www.bluehost.com\/blog\/\",\"name\":\"Bluehost\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bluehost.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#organization\",\"name\":\"Bluehost\",\"url\":\"https:\/\/www.bluehost.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg\",\"contentUrl\":\"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg\",\"width\":136,\"height\":24,\"caption\":\"Bluehost\"},\"image\":{\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/bluehost\/\",\"https:\/\/x.com\/bluehost\",\"https:\/\/www.linkedin.com\/company\/bluehost-com\/\",\"https:\/\/www.youtube.com\/user\/bluehost\",\"https:\/\/en.wikipedia.org\/wiki\/Bluehost\"],\"description\":\"Bluehost is a leading web hosting provider empowering millions of websites worldwide. \\u2028Discover how Bluehost's expertise, reliability, and innovation can help you achieve your online goals.\",\"telephone\":\"+1-888-401-4678\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/c2ee0d64431b62e70e386eaa4941e7c3\",\"name\":\"Brittany Warnock\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/image\/e95812375416aa3926809ab9d111f681\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3c8044aaf313d3619e087c27be4847a7864314571faf9237e85d5e99afdce528?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3c8044aaf313d3619e087c27be4847a7864314571faf9237e85d5e99afdce528?s=96&d=mm&r=g\",\"caption\":\"Brittany Warnock\"},\"url\":\"https:\/\/www.bluehost.com\/blog\/author\/bwarnock\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zombie DDos Attack (Infographic)","description":"In the following infographic, we'll provide a step-by-step outline that details what actually happens during a DDoS attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/3074\/","og_locale":"en_US","og_type":"article","og_title":"Zombie DDos Attack (Infographic)","og_description":"In the following infographic, we'll provide a step-by-step outline that details what actually happens during a DDoS attack.","og_url":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/","og_site_name":"Bluehost Blog","article_publisher":"https:\/\/www.facebook.com\/bluehost\/","article_published_time":"2014-03-05T16:29:37+00:00","og_image":[{"width":1800,"height":360,"url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png","type":"image\/png"}],"author":"Brittany Warnock","twitter_card":"summary_large_image","twitter_creator":"@bluehost","twitter_site":"@bluehost","twitter_misc":{"Written by":"Brittany Warnock","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#article","isPartOf":{"@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/"},"author":{"name":"Brittany Warnock","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/c2ee0d64431b62e70e386eaa4941e7c3"},"headline":"Zombie DDos Attack (Infographic)","datePublished":"2014-03-05T16:29:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/"},"wordCount":176,"publisher":{"@id":"https:\/\/www.bluehost.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png","keywords":["Analytics","Content","Listicle","Seasonal"],"articleSection":["Content Marketing","Marketing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/","url":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/","name":"Zombie DDos Attack (Infographic)","isPartOf":{"@id":"https:\/\/www.bluehost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage"},"image":{"@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png","datePublished":"2014-03-05T16:29:37+00:00","description":"In the following infographic, we'll provide a step-by-step outline that details what actually happens during a DDoS attack.","breadcrumb":{"@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#primaryimage","url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png","contentUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2014\/03\/zombine-computer-1.png","width":1800,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.bluehost.com\/blog\/zombie-attack-infographic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bluehost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/www.bluehost.com\/blog\/category\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"Zombie DDos Attack (Infographic)"}]},{"@type":"WebSite","@id":"https:\/\/www.bluehost.com\/blog\/#website","url":"https:\/\/www.bluehost.com\/blog\/","name":"Bluehost","description":"","publisher":{"@id":"https:\/\/www.bluehost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bluehost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bluehost.com\/blog\/#organization","name":"Bluehost","url":"https:\/\/www.bluehost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg","contentUrl":"https:\/\/www.bluehost.com\/blog\/wp-content\/uploads\/2023\/08\/bluehost-logo.svg","width":136,"height":24,"caption":"Bluehost"},"image":{"@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bluehost\/","https:\/\/x.com\/bluehost","https:\/\/www.linkedin.com\/company\/bluehost-com\/","https:\/\/www.youtube.com\/user\/bluehost","https:\/\/en.wikipedia.org\/wiki\/Bluehost"],"description":"Bluehost is a leading web hosting provider empowering millions of websites worldwide. \u2028Discover how Bluehost's expertise, reliability, and innovation can help you achieve your online goals.","telephone":"+1-888-401-4678"},{"@type":"Person","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/c2ee0d64431b62e70e386eaa4941e7c3","name":"Brittany Warnock","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bluehost.com\/blog\/#\/schema\/person\/image\/e95812375416aa3926809ab9d111f681","url":"https:\/\/secure.gravatar.com\/avatar\/3c8044aaf313d3619e087c27be4847a7864314571faf9237e85d5e99afdce528?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3c8044aaf313d3619e087c27be4847a7864314571faf9237e85d5e99afdce528?s=96&d=mm&r=g","caption":"Brittany Warnock"},"url":"https:\/\/www.bluehost.com\/blog\/author\/bwarnock\/"}]}},"authors":[{"term_id":598,"user_id":7,"is_guest":0,"slug":"bwarnock","display_name":"Brittany Warnock","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/3c8044aaf313d3619e087c27be4847a7864314571faf9237e85d5e99afdce528?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":"","9":"","10":"","11":"","12":"","13":"","14":"","15":""}],"_links":{"self":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/3074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/comments?post=3074"}],"version-history":[{"count":0,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/posts\/3074\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/media\/3275"}],"wp:attachment":[{"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/media?parent=3074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/categories?post=3074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/tags?post=3074"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.bluehost.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=3074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}