Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

@inproceedings{etin2019CleaningUT,
  title={Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai},
  author={Orçun Çetin and Carlos Ga{\~n}{\'a}n and L. Altena and T. Kasama and D. Inoue and Kazuki Tamiya and Ying Tie and K. Yoshioka and M. Eeten},
  booktitle={NDSS},
  year={2019}
}
With the rise of IoT botnets, the remediation of infected devices has become a critical task. [...] Key Method To measure remediation rates, we combine data from an observational study and a randomized controlled trial involving 220 consumers who suffered a Mirai infection together with data from honeypots and darknets. We find that quarantining and notifying infected customers via a walled garden, a best practice from ISP botnet mitigation for conventional malware, remediates 92% of the infections within 14…Expand
20 Citations
Understanding the role of IoT end users in Miria-Like bot remediation
  • Highly Influenced
Examining Mirai's Battle over the Internet of Things
  • 1
A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild
  • 1
  • PDF
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks
  • 2
  • PDF
Remedying Security Concerns at an Internet Scale
  • F. Li
  • Computer Science
  • 2019
  • PDF
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records
  • 1
Selective Forwarding Attack on IoT Home Security Kits
  • 2
  • PDF
...
1
2
...

References

SHOWING 1-10 OF 37 REFERENCES
Understanding the Mirai Botnet
  • 752
  • Highly Influential
  • PDF
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
  • 8
  • PDF
Do Malware Reports Expedite Cleanup? An Experimental Study
  • 29
  • PDF
You've Got Vulnerability: Exploring Effective Vulnerability Notifications
  • 64
  • PDF
Recommendations for the Remediation of Bots in ISP Networks
  • 26
  • PDF
Post-Mortem of a Zombie: Conficker Cleanup After Six Years
  • 31
  • PDF
IoTPOT: Analysing the Rise of IoT Compromises
  • 190
  • PDF
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
  • 48
  • PDF
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup
  • 34
  • PDF
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension
  • 37
  • PDF
...
1
2
3
4
...