Malware Threats Analysis and Mitigation Techniques for Compromised Systems

Luis Eduardo Suástegui Jaramillo 1 *

J INFORM SYSTEMS ENG, Volume 4, Issue 1, Article No: em0087.

https://doi.org/10.29333/jisem/5742

OPEN ACCESS   194 Views   628 Downloads

Download Full Text (PDF) Cite this article

Abstract

On Friday October 21, 2016 there was a Distributed Denial of Service (DDoS) attack that took place on a DNS provider. Its objective was against major websites such as GitHub, Etsy, Twitter, Netflix, and Spotify. This paper is created in order to utilize the Free and Open Source Software (FOSS) available online to identify, classify and remove malware from a compromised system. Presenting an in-depth security analysis of Mirai botnet, a malware that convert devices running Linux into remotely controlled Bots, especially IoT devices, all the compromised systems were used as part of the Mirai botnet for performing large-scale network attacks. The methods presented in this article are generic and can be used as part of an incident response strategy to mitigate any malware of the same nature.

Keywords

Linux Malware, FOSS, Incident Handling, Mirai botnet

HTML

References

Citation

Jaramillo, L. E. S. (2019). Malware Threats Analysis and Mitigation Techniques for Compromised Systems. Journal of Information Systems Engineering & Management, 4(1), em0087. https://doi.org/10.29333/jisem/5742

Submit a Manuscript