DC FieldValueLanguage
dc.contributor.authorJovanović, Đorđeen_US
dc.contributor.authorVuletić, Pavleen_US
dc.date.accessioned2020-12-11T13:28:50Z-
dc.date.available2020-12-11T13:28:50Z-
dc.date.issued2019-11-01-
dc.identifier.isbn978-1-7281-4790-1-
dc.identifier.urihttp://researchrepository.mi.sanu.ac.rs/handle/123456789/4496-
dc.description.abstractThe emergence of Mirai botnet in 2016 has took worldwide research teams unaware, proving that a large number of low-performance IoT devices could be hacked and used for illegal means producing extremely voluminous DDoS attacks. Therefore, a thorough inspection of the current state of IoT botnets is essential. In this paper, we analyze the dynamic behavior and command and control channels of two classes of IoT botnets, Mirai and Gafgyt. Based on collected information, a comparative analysis and key phases of botnet communication is provided. Such an analysis will serve as basis for smart botnet detection mechanisms.en_US
dc.publisherIEEEen_US
dc.subjectBotnets | CnC communication | IoTen_US
dc.titleAnalysis and Characterization of IoT Malware Command and Control Communicationen_US
dc.typeConference Paperen_US
dc.relation.conference27th Telecommunications Forum, TELFOR 2019, Belgrade, Serbia, Serbia 26-27 Nov. 2019en_US
dc.identifier.doi10.1109/TELFOR48224.2019.8971194-
dc.identifier.scopus2-s2.0-85079329155-
dc.relation.firstpage1-
dc.relation.lastpage4-
dc.description.rankM33-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.openairetypeConference Paper-
item.grantfulltextnone-
item.fulltextNo Fulltext-
crisitem.author.orcid0000-0003-1222-1292-
Show simple item record

SCOPUSTM   
Citations

8
checked on Nov 19, 2024

Page view(s)

17
checked on Nov 19, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.