Author:
Ceron João,Steding-Jessen Klaus,Hoepers Cristine,Granville Lisandro,Margi Cíntia
Abstract
IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets’ intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference26 articles.
1. Systemic Vulnerabilities in Customer-Premises Equipment (CPE) Routers;Land,2017
2. Dyn Statement on 10/21/2016 DDoS Attack
http://dyn.com/blog/dyn-statement-on-10212016-ddos-attack/
3. KrebsOnSecurity Hit with Record DDoS
https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Incremental Federated Host Embeddings for Network Telescopes Traffic Analysis;2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW);2024-07-23
2. Dynamic Cluster Analysis to Detect and Track Novelty in Network Telescopes;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. A Comprehensive Review of Internet-of-Things (IoT) Botnet Detection Techniques;Advances in Information Security, Privacy, and Ethics;2024-06-30
4. A Review of the Weaponization of IoT: Security Threats and Countermeasures;2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI);2024-05-23
5. Modular neural network for Edge-based Detection of early-stage IoT Botnet;High-Confidence Computing;2024-04