Repository LOGO
    • Login
    View Item 
    •   Intellectual Repository at Rajamangala University of Technology Phra Nakhon
    • Faculty and Institute (คณะและสถาบัน)
    • Faculty of Engineering
    • Research Report
    • View Item
    •   Intellectual Repository at Rajamangala University of Technology Phra Nakhon
    • Faculty and Institute (คณะและสถาบัน)
    • Faculty of Engineering
    • Research Report
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    The Mirai botnet work process study in cybersecurity of Rajamangala University of Technology Phra Nakhon

    Thumbnail
    View/Open
    ENG_62_64.pdf (8.051Mb)
    Date
    2020-01-14
    Author
    Nilas, Nilamit
    นิลมิต นิลาศ
    Metadata
    Show full item record
    Abstract
    This research aims to study the Mirai Botnet working process, which made high bandwidth impacted to Internet system. From 90,000 clients of Deutsche Telekom cannot access to Internet, that overall bandwidth growth nearly 1 TB per second in the history DDoS attacking behavior. As Mirai exaggerated attacking to ISPs and may be involved UniNet as a big umbrella which RMUTP network interconnected as well. The author would like to study in depth to several weak points of the end devices or IoT on Internet. In the Mirai code used the IoT devices such as the Internet cameras, the CPUs based on ARM, ARM7, Motorola 6800, SPC, PowerPC, X86 and SuperH (SH4). As the results of valuable attacking code studied based-on IPV4 attack, without IPV6. The source code has more than 5,500 lines with 16 files and 138 functions included 62 set of user accounts and passwords. Usage the 9 flooding techniques for port attacking via 22, 23, and 80 with the IP scanning exceptions for DoD, IANA, GE and HP IP addresses. The Internet camera devices have to disable 22, 23 and 80 ports or doing suitable usability techniques to manage for several flooding protection from system harmfully.
    URI
    http://repository.rmutp.ac.th/handle/123456789/2969
    Collections
    • Research Report [286]

    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    @mire NV
     

     


    DSpace software copyright © 2002-2015  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    @mire NV