2018 IEEE Symposium on Computers and Communications (ISCC) 2018
DOI: 10.1109/iscc.2018.8538636
|View full text |Cite
|
Sign up to set email alerts
|

The Evolution of Bashlite and Mirai IoT Botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 132 publications
(66 citation statements)
references
References 7 publications
0
58
0
3
Order By: Relevance
“…In this way, it is possible to have the interruption of services or the use of devices as a launching point of attacks for diverse domains, as is the case of the DDoS attack [3], which has been consolidated for several reasons, such as (i) simplicity and facility of execution, not requiring vast technological knowledge on the attacker side, and (ii) variety of platforms and applications for facilitated attack orchestration. Many of these attacks succeeded in disrupting essential Internet services such as DNS, a ecting millions of users around the world [4], and commercial platforms such as the GitHub [5], prompting severe nancial losses to the organizations that depend on those services.…”
Section: Introductionmentioning
confidence: 99%
“…In this way, it is possible to have the interruption of services or the use of devices as a launching point of attacks for diverse domains, as is the case of the DDoS attack [3], which has been consolidated for several reasons, such as (i) simplicity and facility of execution, not requiring vast technological knowledge on the attacker side, and (ii) variety of platforms and applications for facilitated attack orchestration. Many of these attacks succeeded in disrupting essential Internet services such as DNS, a ecting millions of users around the world [4], and commercial platforms such as the GitHub [5], prompting severe nancial losses to the organizations that depend on those services.…”
Section: Introductionmentioning
confidence: 99%
“…The effect Mirai has on devices it has infected has been studied in order to determine its effects on device usability, power consumption, and network bandwidth consumption [13]. On several smart devices the power consumed by Mirai was found to have a negligible effect on the device during normal operations, but when the device participates in an attack the network bandwidth used increases by a considerable amount.…”
Section: B Mirai Botnetmentioning
confidence: 99%
“…Vários trabalhos na literatura estudam o comportamento e a evolução de malwares [Antonakakis et al 2017, Marzano et al 2018. Existe uma constante evolução dos malwares por parte dos atacantes.…”
Section: Trabalhos Relacionadosunclassified