The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants

09/03/2023
by   Leon Böck, et al.
0

Since the burgeoning days of IoT, Mirai has been established as the canonical IoT botnet. Not long after the public release of its code, researchers found many Mirai variants compete with one another for many of the same vulnerable hosts. Over time, the myriad Mirai variants evolved to incorporate unique vulnerabilities, defenses, and regional concentrations. In this paper, we ask: have Mirai variants evolved to the point that they are fundamentally distinct? We answer this question by measuring two of the most popular Mirai descendants: Hajime and Mozi. To actively scan both botnets simultaneously, we developed a robust measurement infrastructure, BMS, and ran it for more than eight months. The resulting datasets show that these two popular botnets have diverged in their evolutions from their common ancestor in multiple ways: they have virtually no overlapping IP addresses, they exhibit different behavior to network events such as diurnal rate limiting in China, and more. Collectively, our results show that there is no longer one canonical IoT botnet. We discuss the implications of this finding for researchers and practitioners.

READ FULL TEXT
research
06/05/2018

NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT

This paper takes a comprehensive view on the protocol stacks that are un...
research
08/25/2023

A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild

Internet of Things (IoT) is defined as the connection between places and...
research
07/19/2023

Analyzing IoT Hosts in the IPv6 Internet

Users and businesses are increasingly deploying Internet of Things (IoT)...
research
10/20/2021

On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones

Since IoT systems provide services over the Internet, they must continue...
research
12/03/2022

It Is Not Where You Are, It Is Where You Are Registered: IoT Location Impact

This paper investigates how and with whom IoT devices communicate and ho...
research
01/17/2023

Carbon Neutrality Approaches for IoT-Enabled Applications – A Review

Unlike others, IoT-enabled technology has expanded its base in various s...
research
06/03/2021

How Great is the Great Firewall? Measuring China's DNS Censorship

The DNS filtering apparatus of China's Great Firewall (GFW) has evolved ...

Please sign up or login with your details

Forgot password? Click here to reset