{"title":"Hunting IoT Botnets with Wide-area-network Flow Data","authors":"Mingzhe Li, Zhonghao Sun, Zhejun Fang","doi":"10.1109/SDPC.2019.00131","DOIUrl":null,"url":null,"abstract":"With the rise of Internet-of-Things (IoT) technology, botnets like Mirai start to exploit IoT devices and pose severe threats to cybersecurity. In this paper, big data analysis is conducted on wide-area-network session records in an attempt to perceive the influence of botnets on the cyberspace. cNetS, a practical analysis system that can detect and profile botnets is introduced. With this system, infected devices are located with their behaviors reconstructed in detail. Data analysis methods employed can serve as a guidance to detect and combat Mirai-like botnets on the full Internet scale.","PeriodicalId":403595,"journal":{"name":"2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SDPC.2019.00131","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With the rise of Internet-of-Things (IoT) technology, botnets like Mirai start to exploit IoT devices and pose severe threats to cybersecurity. In this paper, big data analysis is conducted on wide-area-network session records in an attempt to perceive the influence of botnets on the cyberspace. cNetS, a practical analysis system that can detect and profile botnets is introduced. With this system, infected devices are located with their behaviors reconstructed in detail. Data analysis methods employed can serve as a guidance to detect and combat Mirai-like botnets on the full Internet scale.