USENIX Security ’17 - Understanding the Mirai Botnet
Manos Antonakakis, Georgia Institute of Technology; Tim April, Akamai; Michael Bailey, University of Illinois, Urbana-Champaign; Matt Bernhard, University of Michigan, Ann Arbor; Elie Bursztein, Google; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Alex Halderman, University of Michigan, Ann Arbor; Luca Invernizzi, Google; Michalis Kallitsis, Merit Network, Inc.; Deepak Kumar, University of Illinois, Urbana-Champaign; Chaz Lever, Georgia Institute of Technology; Zane Ma and Joshua Mason, University of Illinois, Urbana-Champaign; Damian Menscher, Google; Chad Seaman, Akamai; Nick Sullivan, Cloudflare; Kurt Thomas, Google; Yi Zhou, University of Illinois, Urbana-Champaign
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement perspectives, we analyze how the botnet emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. Our measurements serve as a lens into the fragile ecosystem of IoT devices. We argue that Mirai may represent a sea change in the evolutionary development of botnets—the simplicity through which devices were infected and its precipitous growth, demonstrate that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. To address this risk, we recommend technical and nontechnical interventions, as well as propose future research directions.
View the full program: https://www.usenix.org/sec17/program
Видео USENIX Security ’17 - Understanding the Mirai Botnet канала USENIX
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement perspectives, we analyze how the botnet emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. Our measurements serve as a lens into the fragile ecosystem of IoT devices. We argue that Mirai may represent a sea change in the evolutionary development of botnets—the simplicity through which devices were infected and its precipitous growth, demonstrate that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. To address this risk, we recommend technical and nontechnical interventions, as well as propose future research directions.
View the full program: https://www.usenix.org/sec17/program
Видео USENIX Security ’17 - Understanding the Mirai Botnet канала USENIX
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers](https://i.ytimg.com/vi/bDJb8WOJYdA/default.jpg)
![Mirai Inside of an IoT Botnet](https://i.ytimg.com/vi/5fVBB84OiAo/default.jpg)
![Defcon 21 - How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers](https://i.ytimg.com/vi/sgz5dutPF8M/default.jpg)
![USENIX Security '17 - The Loopix Anonymity System](https://i.ytimg.com/vi/R-yEqLX_UvI/default.jpg)
![USENIX ATC '17: Visualizing Performance with Flame Graphs](https://i.ytimg.com/vi/D53T1Ejig1Q/default.jpg)
![DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits](https://i.ytimg.com/vi/HsievGJQG0w/default.jpg)
![USENIX Security '17 - Adaptive Android Kernel Live Patching](https://i.ytimg.com/vi/J5XjHF1AM6Y/default.jpg)
![What is a TLS Cipher Suite?](https://i.ytimg.com/vi/ZM3tXhPV8v0/default.jpg)
![USENIX Enigma 2016 - Timeless Debugging](https://i.ytimg.com/vi/eGl6kpSajag/default.jpg)
![IoT Botnets in 3 Minutes](https://i.ytimg.com/vi/PBzhjRmXy3I/default.jpg)
![USENIX Security '14 - Phone Phreaks: What We Can Learn From the First Network Hackers?](https://i.ytimg.com/vi/FlHN-9S9VWo/default.jpg)
![Botnets - Computerphile](https://i.ytimg.com/vi/UVFmC178_Vs/default.jpg)
![Robin Dreeke - Sizing People Up - DEF CON 27 Social Engineering Village](https://i.ytimg.com/vi/H3XR4QrJyxA/default.jpg)
![USENIX Security '17 - Reverse Engineering x86 Processor Microcode](https://i.ytimg.com/vi/I6dQfnb3y0I/default.jpg)
![Security 101 Workshop: Mobile Security](https://i.ytimg.com/vi/2KZfO1ZD0Og/default.jpg)
![NSDI '20 - A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency](https://i.ytimg.com/vi/8knKKir5IXM/default.jpg)
![Internet of Things Security | Ken Munro | TEDxDornbirn](https://i.ytimg.com/vi/pGtnC1jKpMg/default.jpg)
![SREcon17 Americas - I'm Putting Sloths on the Map](https://i.ytimg.com/vi/7VnX20Ylvbc/default.jpg)
![Mirai attacks explained in 100 seconds](https://i.ytimg.com/vi/UMTTaMPJ8fc/default.jpg)