Skip to main content
. 2021 Jun 6:1–12. Online ahead of print. doi: 10.1007/s11036-021-01789-3

Table 2.

Malicious software used to create an IoT botnet to generate DDoS traffic [46]

Malicious software Type of generated DDoS traffic
Linux.Hydra SYN Flood, UDP Flood
Psyb0t SYN Flood, UDP Flood, ICMP Flood
Tsunami, Kaiten SYN Flood, UDP Flood, ACK Flood
Aidra, LightAidra, Zendran SYN Flood, UDP Flood, ACK-PUSH Flood, HTTP Layer 7 Flood, TCP XMAS
Spike, Dofloo, MrBlack, Wrkatk, Sotdas, AES.DDoS SYN Flood, ACK Flood
BASHLITE, Lizkebab, SYN Flood, UDP Flood, ICMP Flood, DNS Query Flood, HTTP Layer 7 Flood
Elknot, BillGates SYN Flood, UDP Flood, ACK Flood
XOR.DDoS SYN Flood, UDP Flood, ICMP Flood, Flood, DNS Amplification, HTTP Layer 7 Flood, other TCP Floods
LUABOT HTTP Layer 7 Flood
Remaiten, KTN-RM SYN Flood, UDP Flood, ACK Flood, HTTP Layer 7 Flood
NewAidra, Linux.IRCTelne SYN Flood, ACK Flood, ACK-PUSH Flood, TCP XMAS, TCP Floods
Mirai SYN Flood, UDP Flood, ACK Flood, VSE QueryFlood, DNS Water Torture, GRE IP Flood, GRE ETHFlood, HTTP Layer 7 Flood