Return to Article Details Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology Download Download PDF