The Mirai Botnet and the IoT Zombie Armies

被引:0
作者
Kambourakis, Georgios [1 ,2 ]
Kolias, Constantinos [1 ]
Stavrou, Angelos [1 ]
机构
[1] George Mason Univ, Comp Sci Dept, Fairfax, VA 22030 USA
[2] Univ Aegean, Dept Informat & Commun Syst Engn, Mitilini 83200, Greece
来源
MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2017年
关键词
Mirai; Hajime; DDoS; IoT; Botnet; Network Security;
D O I
10.1109/milcom.2017.8170867
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapidly growing presence of Internet of Things (IoT) devices is becoming a continuously alluring playground for malicious actors who try to harness their vast numbers and diverse locations. One of their primary goals is to assemble botnets that can serve their nefarious purposes, ranging from Denial of Service (DoS) to spam and advertisement fraud. The most recent example that highlights the severity of the problem is the Mirai family of malware, which is accountable for a plethora of massive DDoS attacks of unprecedented volume and diversity. The aim of this paper is to offer a comprehensive state-of-the-art review of the IoT botnet landscape and the underlying reasons of its success with a particular focus on Mirai and major similar worms. To this end, we provide extensive details on the internal workings of IoT malware, examine their interrelationships, and elaborate on the possible strategies for defending against them.
引用
收藏
页码:267 / 272
页数:6
相关论文
共 29 条
  • [1] Alvarez M., 2017, MIRAI IOT BOTNET MIN
  • [2] New facets of mobile botnet: architecture and evaluation
    Anagnostopoulos, Marios
    Kambourakis, Georgios
    Gritzalis, Stefanos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 455 - 473
  • [3] Angrishi K., 2017, ARXIV170203681V1
  • [4] [Anonymous], 2016, HEIGHT DDOS THREAT P
  • [5] Ballano M., 2015, Is there an Internet-of-Things vigilante out there
  • [6] Bekerman D., 2016, 650GBPS DDOS ATTACK
  • [7] Bekerman D., 2017, NEW MIRAI VARIANT LA
  • [8] Falliere N., 2009, W32 QAKBOT IN DETAIL
  • [9] hammerzeit, 2016, ARCH BASHL SOURC COD
  • [10] Kaspersky Lab, 2017, WIND BAS SPREAD MIR