The evolution of bashlite and mirai iot botnets
…, C Hoepers, K Steding-Jessen… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar
losses every year. In this work, we study Bashlite botnets and their successors, Mirai botnets. …
losses every year. In this work, we study Bashlite botnets and their successors, Mirai botnets. …
Improving iot botnet investigation using an adaptive network layer
JM Ceron, K Steding-Jessen, C Hoepers, LZ Granville… - Sensors, 2019 - mdpi.com
IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting
the Internet infrastructure. To protect the Internet from such threats and improve security …
the Internet infrastructure. To protect the Internet from such threats and improve security …
Measuring, characterizing, and avoiding spam traffic costs
…, W Meira, C Hoepers, K Steding-Jessen… - IEEE Internet …, 2016 - ieeexplore.ieee.org
Spam messages propagate malware, disseminate phishing exploits, and advertise illegal
products. Those messages generate costs for users and network operators, but it's difficult to …
products. Those messages generate costs for users and network operators, but it's difficult to …
Using low-interaction honeypots to study the abuse of open proxies to send spam
K Steding-Jessen, NL Vijaykumar… - INFOCOMP Journal of …, 2008 - infocomp.dcc.ufla.br
One of the main problems in creating effective mechanisms to mitigate the spam problem is
the lack of more precise data on it. This paper describes the design and implementation of a …
the lack of more precise data on it. This paper describes the design and implementation of a …
[PDF][PDF] A campaign-based characterization of spamming strategies
This paper presents a methodology for the characterization of spamming strategies based on
the identification of spam campaigns. To deeply understand how spammers abuse network …
the identification of spam campaigns. To deeply understand how spammers abuse network …
[PDF][PDF] Exploring the spam arms race to characterize spam evolution
…, C Hoepers, M Chaves, K Steding-Jessen - Proceedings of the …, 2010 - researchgate.net
Current studies on spam evolution usually extract evolution patterns and trends by analyzing
historical spam message corpora. In this paper, we propose a novel methodology that …
historical spam message corpora. In this paper, we propose a novel methodology that …
Identifying and Characterizing bashlite and mirai C&C servers
…, C Hoepers, K Steding-Jessen… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
IoT devices are often a vector for assembling massive botnets, as a consequence of being
broadly available, having limited security protections, and significant challenges in deploying …
broadly available, having limited security protections, and significant challenges in deploying …
[PDF][PDF] Honeynets applied to the CSIRT scenario
C Hoepers, K Steding-Jessen, A Montes - Proceedings of the 15th Annual …, 2003 - Citeseer
A honeynet is a research tool consisting of a network specifically designed for the purpose of
being compromised, with control mechanisms that prevent this network from being used as …
being compromised, with control mechanisms that prevent this network from being used as …
[PDF][PDF] A national early warning capability based on a network of distributed honeypots
C Hoepers, K Steding-Jessen, LER Cordeiro… - 17th Annual FIRST …, 2005 - first.org
We present here the work developed by NBSO/Brazilian CERT, in the “Brazilian Honeypots
Alliance–Distributed Honeypots Project”, to centralize the data gathered in several …
Alliance–Distributed Honeypots Project”, to centralize the data gathered in several …
Spam detection using web page content: a new battleground
…, W Meira Jr, MHPC Chaves, K Steding-Jessen… - Proceedings of the 8th …, 2011 - dl.acm.org
… Steding-Jessen. Exploring the spam arms race to characterize spam evolution. In Proceedings
of the 7th … Steding-Jessen. A campaign-based characterization of spamming strategies. In …
of the 7th … Steding-Jessen. A campaign-based characterization of spamming strategies. In …