Title
Understanding The Mirai Botnet
Abstract
The Mirai bomet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai's growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement perspectives, we analyze how the bot-net emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. Our measurements serve as a lens into the fragile ecosystem of IoT devices. We argue that Mirai may represent a sea change in the evolutionary development of botnets the simplicity through which devices were infected and its precipitous growth, demonstrate that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. To address this risk, we recommend technical and nontechnical interventions, as well as propose future research directions.
Year
Venue
Field
2017
PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17)
Internet privacy,Denial-of-service attack,Computer science,Computer security,Botnet,Internet of Things,Compromise,The Internet
DocType
Citations 
PageRank 
Conference
41
1.41
References 
Authors
33
19
Name
Order
Citations
PageRank
Manos Antonakakis170236.70
Tim April2422.10
Michael Bailey3133578.22
Matt Bernhard4411.41
Elie Bursztein578747.53
Jaime Cochran6411.41
Zakir Durumeric793548.86
J. Alex Halderman82301149.67
Luca Invernizzi927514.27
Michalis Kallitsis10411.41
Deepak Kumar11411.41
Chaz Lever12863.64
Zane Ma13805.51
Joshua Mason141089.79
Damian Menscher15411.41
Chad Seaman16411.41
Nick Sullivan17504.36
Kurt Thomas18118956.78
Yi Zhou1923032.97