• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用自适应网络层改进物联网僵尸网络调查。

Improving IoT Botnet Investigation Using an Adaptive Network Layer.

机构信息

DACS, University of Twente, 7522 NB Enschede, The Netherlands.

CERT.br, Brazilian National Computer Emergency Response Team, Brazil, São Paulo 05801-000, Brazil.

出版信息

Sensors (Basel). 2019 Feb 11;19(3):727. doi: 10.3390/s19030727.

DOI:10.3390/s19030727
PMID:30754667
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6386856/
Abstract

IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets' intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.

摘要

物联网僵尸网络已被用于发起分布式拒绝服务 (DDoS) 攻击,影响互联网基础设施。为了保护互联网免受此类威胁并改进安全机制,了解僵尸网络的意图并描述其行为至关重要。当前的恶意软件分析解决方案在面对物联网时,在网络访问控制和网络流量操纵方面存在局限性。在本文中,我们提出了一种在分析环境中处理物联网恶意软件生成的网络流量的方法。所提出的解决方案可以根据恶意软件执行的操作修改网络层的流量。在我们的案例研究中,我们调查了 Mirai 和 Bashlite 僵尸网络家族,在该案例中,我们能够阻止对其他系统的攻击、识别攻击目标,并重写僵尸网络控制器发送到受感染设备的僵尸网络命令。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/4d252d2ab3f0/sensors-19-00727-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/649c04af16c0/sensors-19-00727-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/74850a268625/sensors-19-00727-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/76c7de0d2cd9/sensors-19-00727-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/5be3cb6f825a/sensors-19-00727-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/6c273897cbdb/sensors-19-00727-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/b3886a3d4094/sensors-19-00727-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/3f02257e05df/sensors-19-00727-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/4d252d2ab3f0/sensors-19-00727-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/649c04af16c0/sensors-19-00727-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/74850a268625/sensors-19-00727-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/76c7de0d2cd9/sensors-19-00727-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/5be3cb6f825a/sensors-19-00727-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/6c273897cbdb/sensors-19-00727-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/b3886a3d4094/sensors-19-00727-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/3f02257e05df/sensors-19-00727-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1336/6386856/4d252d2ab3f0/sensors-19-00727-g008.jpg

相似文献

1
Improving IoT Botnet Investigation Using an Adaptive Network Layer.利用自适应网络层改进物联网僵尸网络调查。
Sensors (Basel). 2019 Feb 11;19(3):727. doi: 10.3390/s19030727.
2
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
3
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.物联网僵尸网络分布式拒绝服务攻击的系统文献综述及检测技术评估
Sensors (Basel). 2024 Jun 1;24(11):3571. doi: 10.3390/s24113571.
4
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
5
Diffusion of White-Hat Botnet Using Lifespan with Controllable Ripple Effect for Malware Removal in IoT Networks.使用具有可控涟漪效应的寿命扩散白帽僵尸网络,以去除物联网网络中的恶意软件。
Sensors (Basel). 2023 Jan 16;23(2):1018. doi: 10.3390/s23021018.
6
Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.基于机器学习的 SDN 赋能物联网中的僵尸网络攻击检测综述。
Sensors (Basel). 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837.
7
Lightweight Internet of Things Botnet Detection Using One-Class Classification.基于单类分类的轻量级物联网僵尸网络检测。
Sensors (Basel). 2022 May 10;22(10):3646. doi: 10.3390/s22103646.
8
Examination of Traditional Botnet Detection on IoT-Based Bots.基于物联网的僵尸网络中传统僵尸网络检测的研究
Sensors (Basel). 2024 Feb 5;24(3):1027. doi: 10.3390/s24031027.
9
Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices.用于异构物联网设备中僵尸网络检测的集成平均深度神经网络。
Sci Rep. 2024 Feb 16;14(1):3878. doi: 10.1038/s41598-024-54438-6.
10
Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet.基于交叉深度学习的物联网僵尸网络传播检测方法
Sensors (Basel). 2022 May 20;22(10):3895. doi: 10.3390/s22103895.

引用本文的文献

1
Examination of Traditional Botnet Detection on IoT-Based Bots.基于物联网的僵尸网络中传统僵尸网络检测的研究
Sensors (Basel). 2024 Feb 5;24(3):1027. doi: 10.3390/s24031027.
2
Botnet Defense System: Observability, Controllability, and Basic Command and Control Strategy.僵尸网络防御系统:可观测性、可控性和基本命令与控制策略。
Sensors (Basel). 2022 Dec 2;22(23):9423. doi: 10.3390/s22239423.
3
Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System.用于僵尸网络防御系统中战术响应的机器学习白帽蠕虫发射器
Sensors (Basel). 2022 Jun 21;22(13):4666. doi: 10.3390/s22134666.
4
White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets .白帽蠕虫对抗恶意软件及其基于 Agent 的 Petri 网评估。
Sensors (Basel). 2020 Jan 19;20(2):556. doi: 10.3390/s20020556.