Mirai Inside of an IoT Botnet
Ron Winward, Radware
2016 was a game changing year in DDoS due to the public release of the Mirai botnet code. Mirai has lead the headlines with its notable attacks and ease of modification. This presentation will discuss the technical details of the Mirai botnet and its stock attacks, how it replicates and how it is controlled. We’ll also explore how it can be modified, including such examples as the TR064 infection vector and more recently an addition of a Domain Generation Algorithm (DGA). Finally, we'll review how network operators can track its activity in real-time.
Mirai Inside of an IoT Botnet (pdf)