Mirai is a type of malware that creates a botnet of internet-connected devices, which can later be used to infect other devices or servers. This paper aims to analyze and explain the Mirai code and create a low-cost simulation environment to aid in the dynamic analysis of Mirai. Further, we perform controlled Denial-of-Service attacks while measuring resource consumption on resource-constrained compromised and victim Internet-of-Things (IoT) devices, such as energy consumption, CPU utilization, memory utilization, Ethernet input/output performance, and Secure Digital card usage. The experimental setup shows that when a compromised device sends a User Datagram Protocol (UDP) flood, it consumes 38.44% more energy than its regular usage. In the case of Secure Digital usage, the victim, when flooded with Transmission Control Protocol (TCP) messages, uses 64.6% more storage for reading and 55.45% more for writing. The significant extra resource consumption caused by Mirai attacks on resource-constrained IoT devices can severely threaten such devices' wide adoption and raises great challenges for the security designs in the resource-constrained IoT environment.
翻译:Mirai是一种恶意软件,它制造了一个互联网连接装置的吸附网,后来可用于感染其他装置或服务器。本文旨在分析和解释米拉码,并创造低成本模拟环境,以协助对米拉伊进行动态分析。此外,我们进行控制性拒绝服务袭击,同时测量资源受限制的受损害和受害者互联网(IoT)设备的资源消耗,如能源消耗、CPU利用、记忆利用、Ethernet输入/输出性能以及安全数字卡使用。实验设置显示,当一个被损坏的装置发送用户数据仪(UDP)洪水时,它消耗的能量比常规使用量多38.44%。在安全数字使用方面,当传输控制协议(TCP)信息泛滥时,受害者使用64.6%以上的读取存储量和55.45%以上的写作量。Mirai对资源受限制的IoT装置的攻击所造成的大量额外资源消耗会严重威胁到这种装置的广泛采用,并对资源受限制的IoT环境的安全设计提出巨大挑战。