A Review of the Weaponization of IoT: Security Threats and Countermeasures

被引:1
|
作者
Kulbacki, Marek [1 ,2 ]
Chaczko, Zenon [3 ]
Barton, Sophie [3 ]
Wajs-Chaczko, Peter [4 ]
Nikodem, Jan [5 ]
Rozenblit, Jerzy W. [6 ]
Klempous, Ryszard [5 ]
Ito, Atsushi [7 ]
Kulbacki, Michal [8 ]
机构
[1] Polish Japanese Acad Informat Technol, Warsaw, Poland
[2] DIVE IN AI, Wroclaw, Poland
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[4] Macquarie Univ, Sydney, NSW, Australia
[5] Wroclaw Univ Sci & Technol, Wroclaw, Poland
[6] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ USA
[7] Chuo Univ, Hachioji, Tokyo, Japan
[8] Univ Wroclaw, Math Inst, Wroclaw, Poland
关键词
IoT device; IoT malware; IoT security; Bashlite source code; IoT weaponization; threat actor; Mirai botnet; INTERNET; THINGS; CHALLENGES;
D O I
10.1109/SACI60582.2024.10619778
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research paper discusses the current state of Internet of Things (IoT) security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats. One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations. This allows attackers to combine the computational power of infected devices to form a botnet, which can then be used to carry out Distributed Denial of Service (DDoS) attacks against specified IP addresses. The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users, thereby degrading the availability of the target's services and resources. This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business-related data. We will describe what IoT weaponization malware is, outline its features, and discuss the most common IoT malware currently present on the Internet. We will then analyze the Mirai source code to fully understand its qualities, including attack types and operations, that allowed it to remain effective.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [21] Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects
    Kuang B.
    Li Y.
    Gu F.
    Su M.
    Fu A.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2304 - 2321
  • [22] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86
  • [23] Security Threats and Countermeasures for Approximate Arithmetic Computing
    Yellu, Pruthvy
    Monjur, Mezanur Rahman
    Kammerer, Timothy
    Xu, Dongpeng
    Yu, Qiaoyan
    2020 25TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2020, 2020, : 259 - 264
  • [24] JTAG Security Threats: Current Attacks and Countermeasures
    Wang S.
    Kameyama S.
    Takahashi H.
    Wang, Senling (wang@cs.ehime-u.ac.jp), 1600, Japan Institute of Electronics Packaging (24): : 668 - 674
  • [25] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [26] Web Application Security: Threats, Countermeasures, and Pitfalls
    Huang, Hsiu-Chuan
    Zhang, Zhi-Kai
    Cheng, Hao-Wen
    Shieh, Shiuhpyng Winston
    COMPUTER, 2017, 50 (06) : 81 - 85
  • [27] Empirical Study of Email Security Threats and Countermeasures
    Nagamalai, Dhinaharan
    Dhinakaran, Beatrice Cynthia
    Ozcan, Abdulkadir
    Okatan, Ali
    Lee, Jae-Kwang
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 229 - 242
  • [28] Security Threats and Countermeasures in Software Defined Networks
    Ahmed, Adnan
    Manzoor, Adnan
    Halepoto, Imtiaz Ali
    Abbas, Fizza
    Rajput, Ubaidullah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (04): : 69 - 74
  • [29] Machine Learning Security: Threats, Countermeasures, and Evaluations
    Xue, Mingfu
    Yuan, Chengxiang
    Wu, Heyi
    Zhang, Yushu
    Liu, Weiqiang
    IEEE ACCESS, 2020, 8 : 74720 - 74742
  • [30] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6