Transcription of Understanding the Mirai Botnet - USENIX
{{id}} {{{paragraph}}}
This paper is included in the Proceedings of the 26th USENIX Security SymposiumAugust 16 18, 2017 Vancouver, BC, CanadaISB N 978 -1- 931971- 4 0 - 9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIXU nderstanding the Mirai BotnetManos Antonakakis, Georgia Institute of Technology; Tim April, Akamai; Michael Bailey, University of Illinois, Urbana-Champaign; Matt Bernhard, University of Michigan, Ann Arbor; Elie Bursztein, Google; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Alex Halderman, University of Michigan, Ann Arbor; Luca Invernizzi, Google; Michalis Kallitsis, Merit Network, Inc.; Deepak Kumar, University of Illinois, Urbana-Champaign; Chaz Lever, Georgia Institute of Technology; Zane Ma and Joshua Mason, University of Illinois, Urbana-Champaign; Damian Menscher, Google; Chad Seaman, Akamai; Nick Sullivan, Cloudflare; Kurt Thomas, Google; Yi Zhou, University of Illinois, Urbana- the Mirai BotnetManos Antonakakis Tim April Michael Bailey Matthew Bernhard/Elie Bursztein Jaime Durumeric/J.
diverse set of vantage points including network telescope probes, Internet-wide banner scans, IoT honeypots, C2 milkers, DNS traces, and logs provided by attack vic- ... our measurement findings with these media reports and expand on the public information surrounding Mirai. Another significant event in this timeline is the public
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}