2 results sorted by ID
Possible spell-corrected query: botnet
Botnet IND: About Botnets of Botless IoT Devices
Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici
Applications
Recent studies and incidents have shed light on the threat
posed by botnets consisting of a large set of relatively weak
IoT devices that host an army of bots. However, little is known
about the threat posed by a small set of devices that are not
infected with malware and do not host bots. In this paper,
we present Botnet-IND (indirect), a new type of distributed
attack which is launched by a botnet consisting of botless IoT
devices. In order to demonstrate the feasibility of Botnet-IND
on...
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor, Benny Pinkas, Eyal Ronen
Bad choices of passwords were and are a pervasive problem. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. E.g, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack.
We present a method to help protect the Internet from such large scale attacks. Our method enables a server to identify popular passwords (heavy hitters), and...
Recent studies and incidents have shed light on the threat posed by botnets consisting of a large set of relatively weak IoT devices that host an army of bots. However, little is known about the threat posed by a small set of devices that are not infected with malware and do not host bots. In this paper, we present Botnet-IND (indirect), a new type of distributed attack which is launched by a botnet consisting of botless IoT devices. In order to demonstrate the feasibility of Botnet-IND on...
Bad choices of passwords were and are a pervasive problem. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. E.g, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack. We present a method to help protect the Internet from such large scale attacks. Our method enables a server to identify popular passwords (heavy hitters), and...