The evolution of Mirai botnet scans over a six-year period
Tài liệu tham khảo
2023
2023
Kolias, 2017, DDoS in the IoT: Mirai and other botnets, Computer, 50, 80, 10.1109/MC.2017.201
360 Netlab, 2018
Putman, 2018, Business model of a botnet, 441
Antonakakis, 2017, Understanding the Mirai botnet, 1093
Liu, 2018, Tracking Mirai variants, Virus Bull, 1
Kambourakis, 2017, The Mirai botnet and the IoT zombie armies, 267
Krebs, 2023
Krebs, 2023
Ji, 2018, The study on the botnet and its prevention policies in the Internet of Things, 837
Gamblin, 2023
Torabi, 2018, Inferring, characterizing, and investigating internet-scale malicious IoT device activities: A network telescope perspective, 562
Araki, 2019, Subspace clustering for interpretable botnet traffic analysis, 1
Pour, 2020, On data-driven curation, learning, and analysis for inferring evolving Internet-of-Things (IoT) botnets in the wild, Comput Secur, 91
Nakip, 2021, Mirai botnet attack detection with auto-associative dense random neural network, 01
Cruz, 2021, An intelligent mechanism to detect cyberattacks of Mirai botnet in IoT networks, 236
Almutairi, 2020, Hybrid botnet detection based on host and network analysis, J Comput Netw Commun, 2020
2017
Silva, 2013, Botnets: A survey, Comput Netw, 57, 378, 10.1016/j.comnet.2012.07.021
Ghafir, 2016, 1
Shinan, 2021, Machine Learning-based botnet detection in Software-Defined Network: A systematic review, Symmetry, 13, 10.3390/sym13050866
Feily, 2009, A survey of botnet and botnet detection, 268
Safar, 2020, Characterising and detection of botnet in P2P network for UDP protocol, Indones J Electr Eng Comput Sci, 18, 1584
Anwar, 2014, A review paper on botnet and botnet detection techniques in Cloud Computing, 28
Wang, 2008, An advanced hybrid Peer-to-Peer botnet, IEEE Trans Dependable Secure Comput, 7, 113, 10.1109/TDSC.2008.35
Sood, 2013, Dissecting SpyEye–Understanding the design of third generation botnets, Comput Netw, 57, 436, 10.1016/j.comnet.2012.06.021
Binsalleeh, 2010, On the analysis of the Zeus botnet crimeware toolkit, 31
Dong, 2008, Deep analysis of intending Peer-to-Peer botnet, 407
Jang, 2009, Analysis of HTTP2P botnet: case study waledac, 409
Lueth, 2015, IoT market analysis: Sizing the opportunity, IoT Anal Rep
Die, 2016
Ravi, 2020, A visualized botnet detection system based Deep Learning for the Internet of Things networks of smart cities, IEEE Trans Ind Appl, 1
Hameed, 2019, 607
Margolis, 2017, An in-depth analysis of the Mirai botnet, 6
Hallman, 2017, IoDDoS — The Internet of distributed denial of service attacks: A case study of the Mirai malware and IoT-based botnets, 47
1981
Griffioen, 2020, Examining Mirai’s battle over the Internet of Things, 743
Goodin, 2016
Moss, 2016
Reynolds, 2016
Radware, 2017
Radware, 2017
ASERT Team, 2017
360 Netlab, 2018
Fengpei, 2017
Ullrich, 2018
2023
Joven, 2018
Ye, 2018
Newman, 2016
Lewis, 2018
SecurityWeek, 2018
Manuel, 2018
Trend Micro, 2018
Trend Micro, 2019
360 Netlab, 2019
360 Netlab, 2020
Trend Micro, 2020
Montalbano, 2020
Avira Protection Labs, 2020
Voolf, 2020
Salvio, 2021
Singhal, 2021
CryptoID, 2021
Lei, 2023
White Ops, 2018
AsSadhan, 2009, Detecting botnets using command and control traffic, 156
Weber, 2023
Macgregor, 2023
Janus, 2011
Fazzi, 2022
Marzano, 2018, The evolution of Bashlite and Mirai IoT botnets, 00813
Paganini, 2016
Die, 2016
Yeh, 2017
Liu, 2019, Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks, Future Gener Comput Syst, 101, 865, 10.1016/j.future.2019.07.021
Dainotti, 2014, Analysis of a “/0” stealth scan from a botnet, IEEE/ACM Trans Netw, 23, 341, 10.1109/TNET.2013.2297678
Wang, 2020, Big data service architecture: a survey, J Internet Technol, 21, 393
Tcydenova, 2021, Detection of adversarial attacks in AI-based intrusion detection systems using explainable AI, Hum-Centric Comput Inform Sci, 11
Shao, 2021, Adaptive online learning for IoT botnet detection, Inform Sci, 574, 84, 10.1016/j.ins.2021.05.076
Alauthman, 2020, An efficient reinforcement learning-based Botnet detection approach, J Netw Comput Appl, 150, 10.1016/j.jnca.2019.102479
Wang, 2020, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Inform Sci, 511, 284, 10.1016/j.ins.2019.09.024
Jaafar, 2021, Identification of compromised IoT devices: Combined approach based on energy consumption and network traffic analysis, 514
Xu, 2018, Tracing MIRAI malware in networked system, 534
Sinanović, 2017, Analysis of Mirai malicious software, 1
Zhang, 2020, IoT botnet forensics: A comprehensive digital forensic case study on Mirai botnet servers, Forensic Sci Int: Digit Investig, 32
Ceron, 2019, Improving IoT botnet investigation using an adaptive network layer, Sensors, 19, 10.3390/s19030727
Palla, 2021, Intelligent Mirai malware detection for IoT nodes, Electronics, 10, 10.3390/electronics10111241
Affinito, 2020, Spark-based port and net scan detection, 1172
Borgnat, 2009, Seven years and one day: Sketching the evolution of internet traffic, 711
Fontugne, 2017, Scaling in internet traffic: A 14 year and 3 day longitudinal study, with multiscale analyses and random projections, IEEE/ACM Trans Netw, 25, 2152, 10.1109/TNET.2017.2675450
Xu, 2001, On the design and performance of prefix-preserving IP traffic trace anonymization, 263
Blaise, 2019, Split-and-Merge: detecting unknown botnets, 153
2017
Rapid7 Labs Team, 2016
2023