MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) 2017
DOI: 10.1109/milcom.2017.8170867
|View full text |Cite
|
Sign up to set email alerts
|

The Mirai botnet and the IoT Zombie Armies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
74
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 158 publications
(74 citation statements)
references
References 3 publications
0
74
0
Order By: Relevance
“…IoT devices and generated over 620 gigabits per second of traffic [10] . Notable targets included the website of cybersecurity journalist Brian Krebs, French web host OVH, and Internet performance and domain service Dyn, [10] resulting in downtime for many popular websites such as Twitter, Netflix, Reddit, and GitHub for several hours [11] .…”
Section: Security Threatsmentioning
confidence: 99%
See 4 more Smart Citations
“…IoT devices and generated over 620 gigabits per second of traffic [10] . Notable targets included the website of cybersecurity journalist Brian Krebs, French web host OVH, and Internet performance and domain service Dyn, [10] resulting in downtime for many popular websites such as Twitter, Netflix, Reddit, and GitHub for several hours [11] .…”
Section: Security Threatsmentioning
confidence: 99%
“…Notable targets included the website of cybersecurity journalist Brian Krebs, French web host OVH, and Internet performance and domain service Dyn, [10] resulting in downtime for many popular websites such as Twitter, Netflix, Reddit, and GitHub for several hours [11] . Whereas most botnets have formed due to unsuspecting computer users downloading malware onto their computers or smartphones that connects it to the botnet, Mirai gained notoriety for targeting IoT devices and infecting them without the user knowing about it.…”
Section: Security Threatsmentioning
confidence: 99%
See 3 more Smart Citations