Antonakakis et al., 2017 - Google Patents
Understanding the mirai botnetAntonakakis et al., 2017
View PDF- Document ID
- 17103394996462178127
- Author
- Antonakakis M
- April T
- Bailey M
- Bernhard M
- Bursztein E
- Cochran J
- Durumeric Z
- Halderman J
- Invernizzi L
- Kallitsis M
- Kumar D
- Lever C
- Ma Z
- Mason J
- Menscher D
- Seaman C
- Sullivan N
- Thomas K
- Zhou Y
- Publication year
- Publication venue
- 26th USENIX security symposium (USENIX Security 17)
External Links
Snippet
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective …
- 201000009910 diseases by infectious agent 0 abstract description 39
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Antonakakis et al. | Understanding the mirai botnet | |
Nawrocki et al. | A survey on honeypot software and data analysis | |
US10354072B2 (en) | System and method for detection of malicious hypertext transfer protocol chains | |
US9860265B2 (en) | System and method for identifying exploitable weak points in a network | |
US9942270B2 (en) | Database deception in directory services | |
US9609019B2 (en) | System and method for directing malicous activity to a monitoring system | |
Vetterl et al. | Honware: A virtual honeypot framework for capturing CPE and IoT zero days | |
US9356950B2 (en) | Evaluating URLS for malicious content | |
US9769204B2 (en) | Distributed system for Bot detection | |
Tsikerdekis et al. | Approaches for preventing honeypot detection and compromise | |
CN104468632A (en) | Loophole attack prevention method, device and system | |
WO2016081561A1 (en) | System and method for directing malicious activity to a monitoring system | |
Martin et al. | Raspberry Pi Malware: An analysis of cyberattacks towards IoT devices | |
Yamada et al. | RAT-based malicious activities detection on enterprise internal networks | |
Bansal et al. | Analysis and Detection of various DDoS attacks on Internet of Things Network | |
Meetei | Mathematical model of security approaches on cloud computing | |
Bythwood et al. | Analyses of automated malicious internet traffic using open-source honeypots | |
Kumar | A principled approach to measuring the IoT ecosystem | |
Cao et al. | A framework for generation, replay, and analysis of real-world attack variants | |
Famera et al. | Analyzing The Mirai IoT Botnet and Its Recent Variants: Satori, Mukashi, Moobot, and Sonic | |
Liakopoulos | Malware analysis & C2 covert channels | |
Guerra Manzanares | HoneyIo4: the construction of a virtual, low-interaction IoT honeypot | |
Song | Leveraging Database Honeypots to Gather Threat Intelligence | |
Fellrath | Recherche sur le Nucléaire | |
Ayala | How hackers gain access to a healthcare facility or hospital network |