T. Abou-assaleh, N. Cercone, V. Keselj, and R. Sweidan, N-grambased detection of new malicious code, Proceedings of the 28th Annual International Computer Software and Applications Conference -Workshops and Fast Abstracts, pp.41-42, 2004.

M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov, and G. Giacinto, Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY '16, pp.183-194, 2016.
DOI : 10.1007/s11416-008-0082-4

URL : http://arxiv.org/pdf/1511.04317

K. Beaumont, Shadows Kill: Mirai DDoS botnet testing large scale attacks, sending threatening messages about UK and attacking researchers. Medium https://medium.com/@networksecurity/ shadows-kill-mirai-ddos-botnet-testing-large-scale-attacks-sending-threatening-messages-about-6a61553d1c7, 2016.

D. Bekerman, New Mirai Variant Launches 54 Hour DDoS Attack against US College, Imperva Incapsula, 2017.

D. Bilar, Opcodes as predictor for malware, International Journal of Electronic Security and Digital Forensics, vol.1, issue.2, pp.156-168, 2007.
DOI : 10.1504/IJESDF.2007.016865

URL : http://cs.wellesley.edu/~dbilar/papers/IJESDF_Opcodes_Bilar.pdf

M. Christodorescu and S. Jha, Static analysis of executables to detect malicious patterns, Proceedings of the 12th Conference on USENIX Security Symposium SSYM'03 USENIX Association. [9] C. Clark. YaraGenerator. XenoSec, pp.12-12, 2003.
DOI : 10.21236/ADA449067

URL : http://pages.cs.wisc.edu/~mihai/publications/Static Analysis of Executables to Detect Malicious Patterns/Static Analysis of Executables to Detect Malicious Patterns.pdf

J. Costello, A. Nixon, B. Hein, R. Tokazowski, and Z. Wikholm, New Mirai Variant Leaves 5 Million Devices Worldwide Vulnerable High Concentration in Germany, 2016.

C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, vol.44, issue.5, pp.643-666, 2004.
DOI : 10.1016/j.comnet.2003.10.003

H. Flake, G. Sig, and . Workshop, Structural comparison of executable objects Detection of Intrusions and Malware & Vulnerability Assessment, Proceedings, volume 46 of LNI, pp.161-173, 2004.

B. Herzberg, D. Bekerman, and I. Zeifman, Breaking Down Mirai: An IoT DDoS Botnet Analysis, Imperva Incapsula, 2016.

J. Jang, J. Woo, A. Mohaisen, J. Yun, and H. K. Kim, Malnetminer: Malware classification approach based on social network analysis of system call graph, Mathematical Problems in Engineering, 2015.

F. Karbalaie, A. Sami, and M. Ahmadi, Semantic malware detection by deploying graph mining, International Journal of Computer Science Issues, vol.9, issue.1, pp.373-379, 2012.

O. Klaba, Last days, we got lot of huge DDoS. Here, the list of " bigger that 100Gbps " only. You can see the simultaneous DDoS are close to 1Tbps ! OVH [twitter user @olesovhcom, 2016.

J. Z. Kolter and M. A. Maloof, Learning to detect malicious executables in the wild, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.470-478, 2004.
DOI : 10.1145/1014052.1014105

B. Krebs, Did the Mirai Botnet Really Take Liberia Offline? KrebsOnSecurity did-the-mirai-botnet-really-take-liberia-offline, 2016.

B. Krebs, Source Code for IoT Botnet 'Mirai' Released. KrebsOnSecurity, 2016.

C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, Polymorphic Worm Detection Using Structural Information of Executables, Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection, RAID'05, pp.207-226, 2006.
DOI : 10.1007/11663812_11

J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and J. Zhang, Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures, EURASIP Journal on Wireless Communications and Networking, vol.45, issue.5, p.692654, 2009.
DOI : 10.1109/MSECP.2004.1264861

URL : https://doi.org/10.1155/2009/692654

!. Malwaremustdie and . Mmd, 0056-2016 -Linux/Mirai, how an old ELF malcode is recycled, 2016.

G. Marsaglia, Xorshift RNGs, Journal of Statistical Software, vol.8, issue.14, pp.1-6, 2003.
DOI : 10.18637/jss.v008.i14

URL : https://doi.org/10.18637/jss.v008.i14

E. Menahem, A. Shabtai, L. Rokach, and Y. Elovici, Improving malware detection by applying multi-inducer ensemble, Computational Statistics & Data Analysis, vol.53, issue.4, pp.1483-1494, 2009.
DOI : 10.1016/j.csda.2008.10.015

URL : http://www.ise.bgu.ac.il/faculty/liorr/malens.pdf

J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security), 2004.

A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007.
DOI : 10.1109/ACSAC.2007.21

A. Nixon, J. Costello, and Z. Wikholm, An After-Action Analysis of the Mirai Botnet Attacks on Dyn. Flashpoint, 2016.

M. G. Schultz, E. Eskin, E. Zadok, and S. J. Stolfo, Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001.
DOI : 10.1109/SECPRI.2001.924286

A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey, Information Security Technical Report, vol.14, issue.1, pp.16-29, 2009.
DOI : 10.1016/j.istr.2009.03.003

Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino et al., SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.17

M. Siddiqui, M. C. Wang, and J. Lee, Data mining methods for malware detection using instruction sequences, Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, AIA '08, pp.358-363, 2008.

J. Stiborek, T. Pevn-`-pevn-`-y, and M. Rehák, Multiple instance learning for malware classification, Expert Systems with Applications, vol.93, 2017.
DOI : 10.1016/j.eswa.2017.10.036

A. H. Sung, J. Xu, P. Chavez, and S. Mukkamala, Static Analyzer of Vicious Executables (SAVE), 20th Annual Computer Security Applications Conference, pp.326-334, 2004.
DOI : 10.1109/CSAC.2004.37

G. R. Thompson and L. A. Flynn, Polymorphic malware detection and identification via context-free grammar homomorphism, Bell Labs Technical Journal, vol.12, issue.3, pp.139-147, 2007.
DOI : 10.1002/bltj.20256

B. Yadegari, B. Johannesmeyer, B. Whitely, and S. Debray, A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, pp.674-691, 2015.
DOI : 10.1109/SP.2015.47

X. Yan, J. Han, A. By, . Mirai, and . Bot, gspan: Graph-based substructure pattern mining7 Hewlett-Packard Company 56.0.0.0/8 US Postal Service 10.0.0.0/8 Internal network 192, Proceedings of the 2002 IEEE International Conference on Data Mining, ICDM '02, p.721, 2002.