N-grambased detection of new malicious code, Proceedings of the 28th Annual International Computer Software and Applications Conference -Workshops and Fast Abstracts, pp.41-42, 2004. ,
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY '16, pp.183-194, 2016. ,
DOI : 10.1007/s11416-008-0082-4
URL : http://arxiv.org/pdf/1511.04317
Shadows Kill: Mirai DDoS botnet testing large scale attacks, sending threatening messages about UK and attacking researchers. Medium https://medium.com/@networksecurity/ shadows-kill-mirai-ddos-botnet-testing-large-scale-attacks-sending-threatening-messages-about-6a61553d1c7, 2016. ,
New Mirai Variant Launches 54 Hour DDoS Attack against US College, Imperva Incapsula, 2017. ,
Opcodes as predictor for malware, International Journal of Electronic Security and Digital Forensics, vol.1, issue.2, pp.156-168, 2007. ,
DOI : 10.1504/IJESDF.2007.016865
URL : http://cs.wellesley.edu/~dbilar/papers/IJESDF_Opcodes_Bilar.pdf
Static analysis of executables to detect malicious patterns, Proceedings of the 12th Conference on USENIX Security Symposium SSYM'03 USENIX Association. [9] C. Clark. YaraGenerator. XenoSec, pp.12-12, 2003. ,
DOI : 10.21236/ADA449067
URL : http://pages.cs.wisc.edu/~mihai/publications/Static Analysis of Executables to Detect Malicious Patterns/Static Analysis of Executables to Detect Malicious Patterns.pdf
New Mirai Variant Leaves 5 Million Devices Worldwide Vulnerable High Concentration in Germany, 2016. ,
DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, vol.44, issue.5, pp.643-666, 2004. ,
DOI : 10.1016/j.comnet.2003.10.003
Structural comparison of executable objects Detection of Intrusions and Malware & Vulnerability Assessment, Proceedings, volume 46 of LNI, pp.161-173, 2004. ,
Breaking Down Mirai: An IoT DDoS Botnet Analysis, Imperva Incapsula, 2016. ,
Malnetminer: Malware classification approach based on social network analysis of system call graph, Mathematical Problems in Engineering, 2015. ,
Semantic malware detection by deploying graph mining, International Journal of Computer Science Issues, vol.9, issue.1, pp.373-379, 2012. ,
Last days, we got lot of huge DDoS. Here, the list of " bigger that 100Gbps " only. You can see the simultaneous DDoS are close to 1Tbps ! OVH [twitter user @olesovhcom, 2016. ,
Learning to detect malicious executables in the wild, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.470-478, 2004. ,
DOI : 10.1145/1014052.1014105
Did the Mirai Botnet Really Take Liberia Offline? KrebsOnSecurity did-the-mirai-botnet-really-take-liberia-offline, 2016. ,
Source Code for IoT Botnet 'Mirai' Released. KrebsOnSecurity, 2016. ,
Polymorphic Worm Detection Using Structural Information of Executables, Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection, RAID'05, pp.207-226, 2006. ,
DOI : 10.1007/11663812_11
Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures, EURASIP Journal on Wireless Communications and Networking, vol.45, issue.5, p.692654, 2009. ,
DOI : 10.1109/MSECP.2004.1264861
URL : https://doi.org/10.1155/2009/692654
0056-2016 -Linux/Mirai, how an old ELF malcode is recycled, 2016. ,
Xorshift RNGs, Journal of Statistical Software, vol.8, issue.14, pp.1-6, 2003. ,
DOI : 10.18637/jss.v008.i14
URL : https://doi.org/10.18637/jss.v008.i14
Improving malware detection by applying multi-inducer ensemble, Computational Statistics & Data Analysis, vol.53, issue.4, pp.1483-1494, 2009. ,
DOI : 10.1016/j.csda.2008.10.015
URL : http://www.ise.bgu.ac.il/faculty/liorr/malens.pdf
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security), 2004. ,
Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007. ,
DOI : 10.1109/ACSAC.2007.21
An After-Action Analysis of the Mirai Botnet Attacks on Dyn. Flashpoint, 2016. ,
Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001. ,
DOI : 10.1109/SECPRI.2001.924286
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey, Information Security Technical Report, vol.14, issue.1, pp.16-29, 2009. ,
DOI : 10.1016/j.istr.2009.03.003
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
DOI : 10.1109/SP.2016.17
Data mining methods for malware detection using instruction sequences, Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, AIA '08, pp.358-363, 2008. ,
Multiple instance learning for malware classification, Expert Systems with Applications, vol.93, 2017. ,
DOI : 10.1016/j.eswa.2017.10.036
Static Analyzer of Vicious Executables (SAVE), 20th Annual Computer Security Applications Conference, pp.326-334, 2004. ,
DOI : 10.1109/CSAC.2004.37
Polymorphic malware detection and identification via context-free grammar homomorphism, Bell Labs Technical Journal, vol.12, issue.3, pp.139-147, 2007. ,
DOI : 10.1002/bltj.20256
A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, pp.674-691, 2015. ,
DOI : 10.1109/SP.2015.47
gspan: Graph-based substructure pattern mining7 Hewlett-Packard Company 56.0.0.0/8 US Postal Service 10.0.0.0/8 Internal network 192, Proceedings of the 2002 IEEE International Conference on Data Mining, ICDM '02, p.721, 2002. ,