Question: please reply as soon as possible AD ACD ABCD ar Section 6: (8 points) Study a real security attack case. On Oct. 21, 2016 morning.
AD ACD ABCD ar Section 6: (8 points) Study a real security attack case. On Oct. 21, 2016 morning. DNS provider Dyn suffered multiple DDoS attacks, many major customer's services, such as AirBnb, Github, Netflix etc. were effected. The attack involved tens of millions DNS lookup from a large number of IP addresses, most of them are so-called Internet of Thing (IoT), such as printers, cameras, home router and even baby monitors. Those loT devices are believed infected with Mirai Malware. Mirai turns systems running Linux into remotely controlled "bots (robots)", that can be used as part of a botnet in large scaled network attack. Mirai is a relatively simple malware, it scans the network, try to use some default login credentials, such as admin/admin, root/pass to login, install Miral, then monitor a command and control server for a target to attack. There are still hundreds of thousands loT devices which never change their default passwords, so risk of another attack is high. Mirai is capable of launch HTTP flood, GRE IP and GRE ETH floods, as well as SYN and ACK floods, STOMP (Simple Text Oriented Message Protocol) floods, DNS floods and UDP flood attacks. Mirai source code is released/leaked in GitHub Discuss this attack, tell me what's your understanding about this security attack and how to prevent Mirai like attack in the future
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
