The virtual machines are connected
to the Internet through a modified HTTP proxy
server and resulting network traffic is captured in PCAP
format. The proxy server only allows a single HTTP connection
to each unique URL during the selected timeout
and blocks subsequent connection attempts to prevent the
infected virtual machine from participating in a DDoS
attack.