Question: Section 6: (8 points) Study a real security attack case. On Oct. 21, 2016 morning, DNS provider Dyn suffered multiple DDoS attacks, many major customer's

 Section 6: (8 points) Study a real security attack case. On

Section 6: (8 points) Study a real security attack case. On Oct. 21, 2016 morning, DNS provider Dyn suffered multiple DDoS attacks, many major customer's services, such as AirBnb, Github, Netflix etc. were effected. The attack involved tens of millions DNS lookup from a large number of IP addresses, most of them are so-called Internet of Thing (lot), such as printers, cameras, home router and even baby monitors. Those lot devices are believed infected with Mirai Malware. Mirai turns systems running Linux into remotely controlled "bots (robots)", that can be used as part of a botnet in large scaled network attack. Miral is a relatively simple malware, it scans the network, try to use some default login credentials, such as admin/admin, root/pass to login, install Mirai, then monitor a command and control server for a target to attack. There are still hundreds of thousands loT devices which never change their default passwords, so risk of another attack is high. Mirai is capable of launch HTTP flood, GRE IP and GRE ETH floods, as well as SYN and ACK floods, STOMP (Simple Text Oriented Message Protocol) floods, DNS floods and UDP flood attacks. Mirai source code is released/leaked in GitHub Discuss this attack, tell me what's your understanding about this security attack and how to prevent Mirai like attack in the future

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!