Table 2.
Malicious software used to create an IoT botnet to generate DDoS traffic [46]
| Malicious software | Type of generated DDoS traffic |
|---|---|
| Linux.Hydra | SYN Flood, UDP Flood |
| Psyb0t | SYN Flood, UDP Flood, ICMP Flood |
| Tsunami, Kaiten | SYN Flood, UDP Flood, ACK Flood |
| Aidra, LightAidra, Zendran | SYN Flood, UDP Flood, ACK-PUSH Flood, HTTP Layer 7 Flood, TCP XMAS |
| Spike, Dofloo, MrBlack, Wrkatk, Sotdas, AES.DDoS | SYN Flood, ACK Flood |
| BASHLITE, Lizkebab, | SYN Flood, UDP Flood, ICMP Flood, DNS Query Flood, HTTP Layer 7 Flood |
| Elknot, BillGates | SYN Flood, UDP Flood, ACK Flood |
| XOR.DDoS | SYN Flood, UDP Flood, ICMP Flood, Flood, DNS Amplification, HTTP Layer 7 Flood, other TCP Floods |
| LUABOT | HTTP Layer 7 Flood |
| Remaiten, KTN-RM | SYN Flood, UDP Flood, ACK Flood, HTTP Layer 7 Flood |
| NewAidra, Linux.IRCTelne | SYN Flood, ACK Flood, ACK-PUSH Flood, TCP XMAS, TCP Floods |
| Mirai | SYN Flood, UDP Flood, ACK Flood, VSE QueryFlood, DNS Water Torture, GRE IP Flood, GRE ETHFlood, HTTP Layer 7 Flood |