Measurement and analysis of Hajime, a peer-to-peer IoT botnet

S Herwig, K Harvey, G Hughey, R Roberts… - Network and Distributed …, 2019 - par.nsf.gov
The Internet of Things (IoT) introduces an unprece-dented diversity and ubiquity to
networked computing. It also introduces new attack surfaces that are a boon to attackers …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

A comprehensive study of email spam botnet detection

WZ Khan, MK Khan, FTB Muhaya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …

Weaving tangled webs: offense, defense, and deception in cyberspace

E Gartzke, JR Lindsay - Security Studies, 2015 - Taylor & Francis
It is widely believed that cyberspace is offense dominant because of technical characteristics
that undermine deterrence and defense. This argument mistakes the ease of deception on …

Measuring {Pay-per-Install}: The commoditization of malware distribution

J Caballero, C Grier, C Kreibich, V Paxson - 20th USENIX Security …, 2011 - usenix.org
Recent years have seen extensive diversification of the “underground economy” associated
with malware and the subversion of Internet-connected systems. This trend towards …

Discriminating DDoS attacks from flash crowds using flow correlation coefficient

S Yu, W Zhou, W Jia, S Guo, Y **ang… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet, and botnets are
usually the engines behind them. Sophisticated botmasters attempt to disable detectors by …

Manufacturing compromise: the emergence of exploit-as-a-service

C Grier, L Ballard, J Caballero, N Chachra… - Proceedings of the …, 2012 - dl.acm.org
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …

Inference and analysis of formal models of botnet command and control protocols

CY Cho, D Babi ć, ECR Shin, D Song - … of the 17th ACM conference on …, 2010 - dl.acm.org
We propose a novel approach to infer protocol state machines in the realistic high-latency
network setting, and apply it to the analysis of botnet Command and Control (C &C) …

[PDF][PDF] The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns

B Stone-Gross, T Holz, G Stringhini… - 4th USENIX Workshop on …, 2011 - usenix.org
Spam accounts for a large portion of the email exchange on the Internet. In addition to being
a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many …

Ad injection at scale: Assessing deceptive advertisement modifications

K Thomas, E Bursztein, C Grier, G Ho… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Today, web injection manifests in many forms, but fundamentally occurs when malicious and
unwanted actors tamper directly with browser sessions for their own profit. In this work we …