Rise of the Machines - Semantic Scholar

The Mirai botnet has forced stakeholders to recognize the lack of security by design and the prevalence of vulnerabilities inherent ... security community of threat actor trends in targeting, services, and capabilities. However, rather than focus ...... The addresses did not appear inside the static code for the application and the ...
3MB Sizes 1 Downloads 136 Views
Rise of the Machines: The Dyn Attack Was Just a Practice Run December 2016 Authors James Scott, Sr. Fellow, ICIT Drew Spaniel, Research, ICIT Copyright © 2016 Institute for Critical Infrastructure Technology – All Rights Reserved

Upcoming Event Learn More about the concepts discussed in this publication at the 2017 ICIT Winter Summit.

Registration is Now Open – www.ICITWinterSummit.org

1

Contents Contents ........................................................................................................................................................ 1 Introduction .................................................................................................................................................. 3 A Simplification of the Internet .................................................................................................................... 4 Protocols ....................................................................................................................................................... 5 ISO OSI..................................................................................................................................................... 5 TCP/IP ...................................................................................................................................................... 6 Anatomy of a Distributed Denial of Service Attack ................................................................................. 7 Constructing a Botnet ........................................................................................................................... 7 Conventional Botnets ............................................................................................................................ 9 IoT Botnets.......................................................................................................................................... 10 Launching a DDoS Attack .................................................................................................................. 11 DDoS-as-a-Service ............................................................................................................................. 12 Mirai Incidents ............................................................................................................................................ 13 KrebsonSecurity...................................................................................................................................... 13 OVH ISP ................................................................................................................................................. 14 Dyn.......................................................................................................................................................... 16 Liberia ..................................................................................................................................................... 18 Lappeenranta, Finland............................................................................................................................. 19 Trump/ Clinton Campaigns..................................................................................................................... 21 WikiLeaks ............................................................................................................................................... 22 Russian Banks ......................................................................................................................................... 23 Evolution of IoT Malware .......................................................................................................................... 25 Linux.Darlloz .......................................................................................................................................... 25 Aidra ..................................................................................................