A Review of the Weaponization of IoT: Security Threats and Countermeasures

被引:1
|
作者
Kulbacki, Marek [1 ,2 ]
Chaczko, Zenon [3 ]
Barton, Sophie [3 ]
Wajs-Chaczko, Peter [4 ]
Nikodem, Jan [5 ]
Rozenblit, Jerzy W. [6 ]
Klempous, Ryszard [5 ]
Ito, Atsushi [7 ]
Kulbacki, Michal [8 ]
机构
[1] Polish Japanese Acad Informat Technol, Warsaw, Poland
[2] DIVE IN AI, Wroclaw, Poland
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[4] Macquarie Univ, Sydney, NSW, Australia
[5] Wroclaw Univ Sci & Technol, Wroclaw, Poland
[6] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ USA
[7] Chuo Univ, Hachioji, Tokyo, Japan
[8] Univ Wroclaw, Math Inst, Wroclaw, Poland
关键词
IoT device; IoT malware; IoT security; Bashlite source code; IoT weaponization; threat actor; Mirai botnet; INTERNET; THINGS; CHALLENGES;
D O I
10.1109/SACI60582.2024.10619778
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research paper discusses the current state of Internet of Things (IoT) security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats. One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations. This allows attackers to combine the computational power of infected devices to form a botnet, which can then be used to carry out Distributed Denial of Service (DDoS) attacks against specified IP addresses. The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users, thereby degrading the availability of the target's services and resources. This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business-related data. We will describe what IoT weaponization malware is, outline its features, and discuss the most common IoT malware currently present on the Internet. We will then analyze the Mirai source code to fully understand its qualities, including attack types and operations, that allowed it to remain effective.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [41] Security in Software-Defined Networking: Threats and Countermeasures
    Shu, Zhaogang
    Wan, Jiafu
    Li, Di
    Lin, Jiaxiang
    Vasilakos, Athanasios V.
    Imran, Muhammad
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 764 - 776
  • [42] A Survey: Security Threats and Countermeasures in Software Defined Networking
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 180 - 185
  • [43] Security Threats and Countermeasures for Intra-Vehicle Networks
    Wampler, David
    Fu, Huirong
    Zhu, Ye
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 153 - +
  • [44] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184
  • [45] Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications
    Wang L.
    Chen Y.
    Wang P.
    Yan Z.
    IEEE Communications Standards Magazine, 2021, 5 (04): : 41 - 47
  • [46] Security in Software-Defined Networking: Threats and Countermeasures
    Zhaogang Shu
    Jiafu Wan
    Di Li
    Jiaxiang Lin
    Athanasios V. Vasilakos
    Muhammad Imran
    Mobile Networks and Applications, 2016, 21 : 764 - 776
  • [47] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [48] Cyber-Physical Systems: Security Threats and Countermeasures
    Hammoudeh, Mohammad
    Epiphaniou, Gregory
    Pinto, Pedro
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [49] Security Threats, Countermeasures, and Challenges of Digital Supply Chains
    Hammi, Badis
    Zeadally, Sherali
    Nebhen, Jamel
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [50] A Survey on Security Threats and Countermeasures in IEEE Test Standards
    Valea, Emanuele
    Da Silva, Mathieu
    Di Natale, Giorgio
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    IEEE DESIGN & TEST, 2019, 36 (03) : 95 - 116