IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets’ intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, ...
Internet-wide security and resilience have traditionally been subject to large-scale DDoS attacks in...
Undoubtedly, the Internet of Things (IoT) contributes significantly to daily mission-critical proces...
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilit...
Internet of Things(IoT) malware established itself as the new type of threat after enabling the most...
A botnet is a set of connected devices which have been infected with malware that allows an attack...
Distributed Denial-of-Service (DDoS) attacks are one of the biggest threats to the availability of I...
Detecting intrusions is usually the first step in containing a security breach. In this dissertation...
As the prevalence of the Internet of Things (IoT)continues to increase, cyber criminals are quick to...
© 2017 IEEE. Botnets compromised of IoT devices have been on the rise recently with attacks originat...
As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick t...
The proliferation of insecure Internet-connected devices gave rise to the IoT botnets which can grow...
Internet-wide security and resilience have traditionally been subject to large-scale DDoS attacks in...
Botnets are a form of cyber threat responsible for massive Distributed Denial of Service (DDoS) atta...
The development of computing technology in increasing the accessibility and agility of daily activit...
In recent years, emerging technologies such as the Internet of Things gain increasing interest in va...
Internet-wide security and resilience have traditionally been subject to large-scale DDoS attacks in...
Undoubtedly, the Internet of Things (IoT) contributes significantly to daily mission-critical proces...
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilit...
Internet of Things(IoT) malware established itself as the new type of threat after enabling the most...
A botnet is a set of connected devices which have been infected with malware that allows an attack...
Distributed Denial-of-Service (DDoS) attacks are one of the biggest threats to the availability of I...
Detecting intrusions is usually the first step in containing a security breach. In this dissertation...
As the prevalence of the Internet of Things (IoT)continues to increase, cyber criminals are quick to...
© 2017 IEEE. Botnets compromised of IoT devices have been on the rise recently with attacks originat...
As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick t...
The proliferation of insecure Internet-connected devices gave rise to the IoT botnets which can grow...
Internet-wide security and resilience have traditionally been subject to large-scale DDoS attacks in...
Botnets are a form of cyber threat responsible for massive Distributed Denial of Service (DDoS) atta...
The development of computing technology in increasing the accessibility and agility of daily activit...
In recent years, emerging technologies such as the Internet of Things gain increasing interest in va...
Internet-wide security and resilience have traditionally been subject to large-scale DDoS attacks in...
Undoubtedly, the Internet of Things (IoT) contributes significantly to daily mission-critical proces...
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilit...