[1]
Cloudflare, What is aDDoS attack? (2024). https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
Google Scholar
[2]
S. O. Imadu, S.A Lawani, P. U. Chinedu, B. A. Ikharo , Queuing System in E-commerce: An approach to Strengthen its Security, 2023 2nd International Conference on Multidisciplinary Engineering and Applied Science (ICMEAS),Abuja, Nigeria. (2023) 1-6.
DOI: 10.1109/ICMEAS58693.2023.10379219
Google Scholar
[3]
T. Arumuga Maria Devi, M. Arunima and K. Rooban Prakash, DDoS Attack using Botnets, International Journal of Engineering Research & Technology (IJERT), ICCIDT - 2022 Conference Proceedings. Special Issue. 10(04) (2022) 277-279.
Google Scholar
[4]
The Huy Nguyen This research report, tthreat Research Note, Mirai and its common attack method. (2023). https://6483172.fs1.hubspotusercontent-na1.net/hubfs/6483172/collateral/ threat-research/corero-threat-research-mirai.pdf.
Google Scholar
[5]
Mamoru Saito and Minoru Kobayashi, Mirai Botnet Detection and Countermeasures. Internet Initiative Japan Inc, Infrastructure Seecurity IIR. 33(2016).
Google Scholar
[6]
Constantinos Kolias and Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets", https://www.researchgate.net/publication/ 318288727Computer 50, 2 (2017) 80–84
DOI: 10.1109/mc.2017.201
Google Scholar
[7]
Burair Saad Hameed, Selvakumar Manickam and Kamal Alieyan, Internet of Things Botnet (mirai): A systematic review. (2019)
Google Scholar
[8]
Evan Cooke, Farnam Jahanian, and Danny McPherson, The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets, SRUTI 5 (2005)
Google Scholar
[9]
Jing Wang and Ioannis Ch Paschalidis, Botnet detection based on anomaly and community detection, IEEE Transactions on Control of Network Systems 4, 2 (2016) 392–404
DOI: 10.1109/tcns.2016.2532804
Google Scholar
[10]
Stijn Pletinckx, Cyril Trap, and Christian Doerr, Malware coordination using the blockchain: An analysis of the cerber ransomware", In 2018 IEEE Conference on Communications and Network Security (CNS). (2018).
DOI: 10.1109/cns.2018.8433199
Google Scholar
[11]
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas, DDoS in the IoT: Mirai and other botnets, Computer 50, 7 (2017) 80–84
DOI: 10.1109/mc.2017.201
Google Scholar
[12]
Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Understanding the mirai botnet, In 26th USENIX Security Symposium. (2017) 1093–1110.
Google Scholar
[13]
Orcun Çetin, Carlos Ganán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, and Michel van Eeten, Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai", In NDSS. (2019). https://www.ndss-symposium.org/ndss-paper/cleaning-up-the-internet-of-evil-things-real-world-evidence-on-isp-and-consumer-efforts-to-remove-mirai/.
DOI: 10.14722/ndss.2019.23438
Google Scholar
[14]
Giovanni Bottazzi and Gianluigi Me, The botnet revenue model, In Proceedings of the 7th International Conference on Security of Information and Networks. (2014). https://www.researchgate.net/publication/279852221_The_Botnet_Revenue_Model.
DOI: 10.1145/2659651.2659673
Google Scholar
[15]
Hugo LJ Bijmans, Tim M Booij, and Christian Doerr, Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking, In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. (2019)449-464.
DOI: 10.1145/3319535.3354230
Google Scholar
[16]
Hwanjo Heo and Seungwon Shin, Who is knocking on the telnet port: A large-scale empirical study of network scanning", In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. (2018) 625–636.
DOI: 10.1145/3196494.3196537
Google Scholar
[17]
Krebs on Security, Krebs On Security Hit with Record DDoS, (https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/).
Google Scholar
[18]
GitHub, (2024). https://github.com/malwaredllc/byob
Google Scholar
[19]
Harm Griffioen and Christian Doerr, Examining Mirai's Battle over the Internet of Things, Conference on Computer and Communications Security. (2020). ReseasrchGate, https://www.researchgate.net/publication/346593167.
DOI: 10.1145/3372297.3417277
Google Scholar
[20]
Virus Info A tweet reporting on the status of the DDoS. OVH (2019). (https://twitter.com/olesovhcom/status/779297257199964160).
Google Scholar