Review Article

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

Figure 2

Architecture models examples.
(a) Agent-Handler model
(b) Reflector model
(c) IRC-based model
(d) P2P-based model