Analysis and Characterization of IoT Malware Command and Control Communication

2Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

The emergence of Mirai botnet in 2016 took worldwide research teams by surprise, proving that a large number of low-performance IoT devices could be hacked and used for illegal purposes, causing extremely voluminous DDoS attacks. Therefore, a thorough inspection of the current state of IoT botnets is essential. In this paper, we analyze the dynamic behavior and command and control channels of two classes of IoT botnets, Mirai and Gafgyt. Based on collected information, a comparative analysis and key phases of botnet communication is provided. Such an analysis will serve as a basis for smart botnet detection mechanisms.

Author supplied keywords

Cite

CITATION STYLE

APA

Jovanović, Đ. D., & Vuletić, P. V. (2020). Analysis and Characterization of IoT Malware Command and Control Communication. Telfor Journal, 12(2), 80–85. https://doi.org/10.5937/TELFOR2002080J

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free