{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:39:57Z","timestamp":1768426797267,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SIDN"},{"name":"Dutch Research Council (NWO)","award":["628.001.033"],"award-info":[{"award-number":["628.001.033"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3409177","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T10:24:32Z","timestamp":1598351072000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Disposable botnets"],"prefix":"10.1145","author":[{"given":"Rui","family":"Tanabe","sequence":"first","affiliation":[{"name":"Yokohama National University"}]},{"given":"Tatsuya","family":"Tamai","sequence":"additional","affiliation":[{"name":"Yokohama National University"}]},{"given":"Akira","family":"Fujita","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications technology"}]},{"given":"Ryoichi","family":"Isawa","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications technology"}]},{"given":"Katsunari","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Yokohama National University"}]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[{"name":"Yokohama National University"}]},{"given":"Carlos","family":"Ga\u00f1\u00e1n","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Michel","family":"van Eeten","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017"},{"key":"e_1_3_2_1_2_1","unstructured":"Ryan Barnett. 2018. New Tsunami\/Kaiten Variant: Propagation Status - Akamai Security Intelligence and Threat Research Blog. https:\/\/blogs.akamai.com\/sitr\/2018\/09\/new-tsunamikaiten-variant-propagation-status.html  Ryan Barnett. 2018. New Tsunami\/Kaiten Variant: Propagation Status - Akamai Security Intelligence and Threat Research Blog. https:\/\/blogs.akamai.com\/sitr\/2018\/09\/new-tsunamikaiten-variant-propagation-status.html"},{"key":"e_1_3_2_1_3_1","volume-title":"ISCC","author":"Bastos Gabriel","year":"2019"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354230"},{"key":"e_1_3_2_1_6_1","unstructured":"360\n    Netlab Blog. 2018. Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address. https:\/\/blog.netlab.360.com\/art-of-steal-satori-variant-is-robbing-eth-bitcoin-by-replacing-wallet-address-en\/  360 Netlab Blog. 2018. Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address. https:\/\/blog.netlab.360.com\/art-of-steal-satori-variant-is-robbing-eth-bitcoin-by-replacing-wallet-address-en\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23438"},{"key":"e_1_3_2_1_8_1","unstructured":"Igor Daniloff. 2019. Doctor Web. https:\/\/www.drweb.com  Igor Daniloff. 2019. Doctor Web. https:\/\/www.drweb.com"},{"key":"e_1_3_2_1_9_1","volume-title":"Analysis of DDoS-Capable IoT Malwares. In Federated Conference on Computer Science and Information Systems.","author":"Donno Michele De","year":"2017"},{"key":"e_1_3_2_1_10_1","volume-title":"Hajime: Analysis of a decentralized internet worm for IoT devices. Rapidity Networks 16","author":"Edwards Sam","year":"2016"},{"key":"e_1_3_2_1_11_1","unstructured":"Fortinet. 2018. DDoS-for-Hire Service Powered by Bushido Botnet. https:\/\/www.fortinet.com\/blog\/threat-research\/ddos-for-hire-service-powered-by-bushido-botnet-.html  Fortinet. 2018. DDoS-for-Hire Service Powered by Bushido Botnet. https:\/\/www.fortinet.com\/blog\/threat-research\/ddos-for-hire-service-powered-by-bushido-botnet-.html"},{"key":"e_1_3_2_1_12_1","unstructured":"Max Goncharov. 2015. Criminal hideouts for lease: Bulletproof hosting services. https:\/\/www.trendmicro.no\/media\/wp\/wp-criminal-hideouts-for-lease-en.pdf  Max Goncharov. 2015. Criminal hideouts for lease: Bulletproof hosting services. https:\/\/www.trendmicro.no\/media\/wp\/wp-criminal-hideouts-for-lease-en.pdf"},{"key":"e_1_3_2_1_13_1","volume-title":"CPSS","author":"Guarnizo Juan","year":"2019"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23488"},{"key":"e_1_3_2_1_15_1","unstructured":"Hex-Rays. 2019. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/  Hex-Rays. 2019. IDA Pro. https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"e_1_3_2_1_16_1","unstructured":"IP2Location.com. 2018. IP2Location. https:\/\/www.ip2location.com\/  IP2Location.com. 2018. IP2Location. https:\/\/www.ip2location.com\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Kamran Riaz Khan, Affan A. Syed, and Syed Ali Khayam.","author":"Khattak Sheharbano","year":"2013"},{"key":"e_1_3_2_1_19_1","unstructured":"Brian Krebs. 2017. Who is Anna-Senpai the Mirai Worm Author? https:\/\/krebsonsecurity.com\/2017\/01\/who-is-anna-senpai-the-mirai-worm-author\/  Brian Krebs. 2017. Who is Anna-Senpai the Mirai Worm Author? https:\/\/krebsonsecurity.com\/2017\/01\/who-is-anna-senpai-the-mirai-worm-author\/"},{"key":"e_1_3_2_1_20_1","volume-title":"The Evolution of Bashlit and Mirai IoT Botnet. In IEEE Symposium on Computers and Communications (ISCC","author":"Marzano Artur","year":"2018"},{"key":"e_1_3_2_1_21_1","unstructured":"Maxmind. 2019. GeoIP2 Databases. https:\/\/www.maxmind.com\/  Maxmind. 2019. GeoIP2 Databases. https:\/\/www.maxmind.com\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Krebs on Security. 2017. Mirai IoT Botnet Co-Authors Plead Guilty. https:\/\/krebsonsecurity.com\/2017\/12\/mirai-iot-botnet-co-authors-plead-guilty\/  Krebs on Security. 2017. Mirai IoT Botnet Co-Authors Plead Guilty. https:\/\/krebsonsecurity.com\/2017\/12\/mirai-iot-botnet-co-authors-plead-guilty\/"},{"key":"e_1_3_2_1_23_1","volume-title":"IoTPOT: Analysing the Rise of IoT Compromises. In 9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Pa Pa Yin Minn","year":"2015"},{"key":"e_1_3_2_1_24_1","volume-title":"Learning and Analysis for Inferring Evolving IoT Botnets in the Wild. In ARES","author":"Pour Morteza Safaei","year":"2019"},{"key":"e_1_3_2_1_25_1","unstructured":"Farsight Security. 2018. DNSDB. https:\/\/www.dnsdb.info\/  Farsight Security. 2018. DNSDB. https:\/\/www.dnsdb.info\/"},{"key":"e_1_3_2_1_26_1","volume-title":"BASHLITE family of Malware Infects 1 Million IoT devices. Threat Post","author":"Spring Tom","year":"2016"},{"key":"e_1_3_2_1_27_1","unstructured":"Jornt van der Wiel Vicente Diaz Yury Namestnikov and Zykov Konstantin. 2017. Hajime the mysterious evolving botnet. https:\/\/securelist.com\/hajime-the-mysterious-evolving-botnet\/78160\/  Jornt van der Wiel Vicente Diaz Yury Namestnikov and Zykov Konstantin. 2017. Hajime the mysterious evolving botnet. https:\/\/securelist.com\/hajime-the-mysterious-evolving-botnet\/78160\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_26"},{"key":"e_1_3_2_1_29_1","unstructured":"Meng Wang Javier Santillan and Fernando Kuipers. 2018. ThingPot: an interactive IoT honeypot. arXiv:1807.04114  Meng Wang Javier Santillan and Fernando Kuipers. 2018. ThingPot: an interactive IoT honeypot. arXiv:1807.04114"},{"key":"e_1_3_2_1_30_1","volume-title":"22nd International AVAR cybersecurity conference. https:\/\/www.avar2019","author":"Ye GenShen","year":"2019"},{"key":"e_1_3_2_1_31_1","unstructured":"ZDNet. 2019. Hacker leaks passwords for more than 500 000 servers routers and IoT devices. https:\/\/www.zdnet.com\/article\/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices\/.  ZDNet. 2019. Hacker leaks passwords for more than 500 000 servers routers and IoT devices. https:\/\/www.zdnet.com\/article\/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices\/."}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","location":"Virtual Event Ireland","acronym":"ARES 2020"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3409177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:42Z","timestamp":1750195482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409177"}},"subtitle":["examining the anatomy of IoT botnet infrastructure"],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":29,"alternative-id":["10.1145\/3407023.3409177","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3409177","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}