Malware Threats Analysis and Mitigation Techniques for Compromised Systems
Luis Eduardo Suástegui Jaramillo 1 *
More Detail
1 Universidad Católica Santiago de Guayaquil, Facultad de Educación Técnica para el Desarrollo, Guayaquil, ECUADOR
* Corresponding Author


On Friday October 21, 2016 there was a Distributed Denial of Service (DDoS) attack that took place on a DNS provider. Its objective was against major websites such as GitHub, Etsy, Twitter, Netflix, and Spotify. This paper is created in order to utilize the Free and Open Source Software (FOSS) available online to identify, classify and remove malware from a compromised system. Presenting an in-depth security analysis of Mirai botnet, a malware that convert devices running Linux into remotely controlled Bots, especially IoT devices, all the compromised systems were used as part of the Mirai botnet for performing large-scale network attacks. The methods presented in this article are generic and can be used as part of an incident response strategy to mitigate any malware of the same nature.


This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Article Type: Research Article

J INFORM SYSTEMS ENG, 2019 - Volume 4 Issue 1, Article No: em0087

Publication date: 24 Mar 2019

Article Views: 707

Article Downloads: 1807

Open Access References How to cite this article