The evolution of Mirai botnet scans over a six-year period

Journal of Information Security and Applications - Tập 79 - Trang 103629 - 2023
Antonia Affinito1, Stefania Zinno1, Giovanni Stanco1, Alessio Botta1, Giorgio Ventre1
1University of Napoli Federico II, via Claudio 21, Napoli 80125, Italy

Tài liệu tham khảo

2023 2023 Kolias, 2017, DDoS in the IoT: Mirai and other botnets, Computer, 50, 80, 10.1109/MC.2017.201 360 Netlab, 2018 Putman, 2018, Business model of a botnet, 441 Antonakakis, 2017, Understanding the Mirai botnet, 1093 Liu, 2018, Tracking Mirai variants, Virus Bull, 1 Kambourakis, 2017, The Mirai botnet and the IoT zombie armies, 267 Krebs, 2023 Krebs, 2023 Ji, 2018, The study on the botnet and its prevention policies in the Internet of Things, 837 Gamblin, 2023 Torabi, 2018, Inferring, characterizing, and investigating internet-scale malicious IoT device activities: A network telescope perspective, 562 Araki, 2019, Subspace clustering for interpretable botnet traffic analysis, 1 Pour, 2020, On data-driven curation, learning, and analysis for inferring evolving Internet-of-Things (IoT) botnets in the wild, Comput Secur, 91 Nakip, 2021, Mirai botnet attack detection with auto-associative dense random neural network, 01 Cruz, 2021, An intelligent mechanism to detect cyberattacks of Mirai botnet in IoT networks, 236 Almutairi, 2020, Hybrid botnet detection based on host and network analysis, J Comput Netw Commun, 2020 2017 Silva, 2013, Botnets: A survey, Comput Netw, 57, 378, 10.1016/j.comnet.2012.07.021 Ghafir, 2016, 1 Shinan, 2021, Machine Learning-based botnet detection in Software-Defined Network: A systematic review, Symmetry, 13, 10.3390/sym13050866 Feily, 2009, A survey of botnet and botnet detection, 268 Safar, 2020, Characterising and detection of botnet in P2P network for UDP protocol, Indones J Electr Eng Comput Sci, 18, 1584 Anwar, 2014, A review paper on botnet and botnet detection techniques in Cloud Computing, 28 Wang, 2008, An advanced hybrid Peer-to-Peer botnet, IEEE Trans Dependable Secure Comput, 7, 113, 10.1109/TDSC.2008.35 Sood, 2013, Dissecting SpyEye–Understanding the design of third generation botnets, Comput Netw, 57, 436, 10.1016/j.comnet.2012.06.021 Binsalleeh, 2010, On the analysis of the Zeus botnet crimeware toolkit, 31 Dong, 2008, Deep analysis of intending Peer-to-Peer botnet, 407 Jang, 2009, Analysis of HTTP2P botnet: case study waledac, 409 Lueth, 2015, IoT market analysis: Sizing the opportunity, IoT Anal Rep Die, 2016 Ravi, 2020, A visualized botnet detection system based Deep Learning for the Internet of Things networks of smart cities, IEEE Trans Ind Appl, 1 Hameed, 2019, 607 Margolis, 2017, An in-depth analysis of the Mirai botnet, 6 Hallman, 2017, IoDDoS — The Internet of distributed denial of service attacks: A case study of the Mirai malware and IoT-based botnets, 47 1981 Griffioen, 2020, Examining Mirai’s battle over the Internet of Things, 743 Goodin, 2016 Moss, 2016 Reynolds, 2016 Radware, 2017 Radware, 2017 ASERT Team, 2017 360 Netlab, 2018 Fengpei, 2017 Ullrich, 2018 2023 Joven, 2018 Ye, 2018 Newman, 2016 Lewis, 2018 SecurityWeek, 2018 Manuel, 2018 Trend Micro, 2018 Trend Micro, 2019 360 Netlab, 2019 360 Netlab, 2020 Trend Micro, 2020 Montalbano, 2020 Avira Protection Labs, 2020 Voolf, 2020 Salvio, 2021 Singhal, 2021 CryptoID, 2021 Lei, 2023 White Ops, 2018 AsSadhan, 2009, Detecting botnets using command and control traffic, 156 Weber, 2023 Macgregor, 2023 Janus, 2011 Fazzi, 2022 Marzano, 2018, The evolution of Bashlite and Mirai IoT botnets, 00813 Paganini, 2016 Die, 2016 Yeh, 2017 Liu, 2019, Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks, Future Gener Comput Syst, 101, 865, 10.1016/j.future.2019.07.021 Dainotti, 2014, Analysis of a “/0” stealth scan from a botnet, IEEE/ACM Trans Netw, 23, 341, 10.1109/TNET.2013.2297678 Wang, 2020, Big data service architecture: a survey, J Internet Technol, 21, 393 Tcydenova, 2021, Detection of adversarial attacks in AI-based intrusion detection systems using explainable AI, Hum-Centric Comput Inform Sci, 11 Shao, 2021, Adaptive online learning for IoT botnet detection, Inform Sci, 574, 84, 10.1016/j.ins.2021.05.076 Alauthman, 2020, An efficient reinforcement learning-based Botnet detection approach, J Netw Comput Appl, 150, 10.1016/j.jnca.2019.102479 Wang, 2020, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Inform Sci, 511, 284, 10.1016/j.ins.2019.09.024 Jaafar, 2021, Identification of compromised IoT devices: Combined approach based on energy consumption and network traffic analysis, 514 Xu, 2018, Tracing MIRAI malware in networked system, 534 Sinanović, 2017, Analysis of Mirai malicious software, 1 Zhang, 2020, IoT botnet forensics: A comprehensive digital forensic case study on Mirai botnet servers, Forensic Sci Int: Digit Investig, 32 Ceron, 2019, Improving IoT botnet investigation using an adaptive network layer, Sensors, 19, 10.3390/s19030727 Palla, 2021, Intelligent Mirai malware detection for IoT nodes, Electronics, 10, 10.3390/electronics10111241 Affinito, 2020, Spark-based port and net scan detection, 1172 Borgnat, 2009, Seven years and one day: Sketching the evolution of internet traffic, 711 Fontugne, 2017, Scaling in internet traffic: A 14 year and 3 day longitudinal study, with multiscale analyses and random projections, IEEE/ACM Trans Netw, 25, 2152, 10.1109/TNET.2017.2675450 Xu, 2001, On the design and performance of prefix-preserving IP traffic trace anonymization, 263 Blaise, 2019, Split-and-Merge: detecting unknown botnets, 153 2017 Rapid7 Labs Team, 2016 2023