A Review of the Weaponization of IoT: Security Threats and Countermeasures

被引:1
|
作者
Kulbacki, Marek [1 ,2 ]
Chaczko, Zenon [3 ]
Barton, Sophie [3 ]
Wajs-Chaczko, Peter [4 ]
Nikodem, Jan [5 ]
Rozenblit, Jerzy W. [6 ]
Klempous, Ryszard [5 ]
Ito, Atsushi [7 ]
Kulbacki, Michal [8 ]
机构
[1] Polish Japanese Acad Informat Technol, Warsaw, Poland
[2] DIVE IN AI, Wroclaw, Poland
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[4] Macquarie Univ, Sydney, NSW, Australia
[5] Wroclaw Univ Sci & Technol, Wroclaw, Poland
[6] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ USA
[7] Chuo Univ, Hachioji, Tokyo, Japan
[8] Univ Wroclaw, Math Inst, Wroclaw, Poland
来源
18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024 | 2024年
关键词
IoT device; IoT malware; IoT security; Bashlite source code; IoT weaponization; threat actor; Mirai botnet; INTERNET; THINGS; CHALLENGES;
D O I
10.1109/SACI60582.2024.10619778
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research paper discusses the current state of Internet of Things (IoT) security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats. One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations. This allows attackers to combine the computational power of infected devices to form a botnet, which can then be used to carry out Distributed Denial of Service (DDoS) attacks against specified IP addresses. The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users, thereby degrading the availability of the target's services and resources. This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business-related data. We will describe what IoT weaponization malware is, outline its features, and discuss the most common IoT malware currently present on the Internet. We will then analyze the Mirai source code to fully understand its qualities, including attack types and operations, that allowed it to remain effective.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [1] Cyber security threats in IoT: A review
    Rana, Pragati
    Patil, B. P.
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (02) : 105 - 120
  • [2] A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
    Abdul-Ghani, Hezam Akram
    Konstantas, Dimitri
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
  • [3] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [4] Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
    Samaila, Musa G.
    Sequeiros, Joao B. F.
    Freire, Mario M.
    Inacio, Pedro R. M.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [5] A systematic review of security threats and countermeasures in SaaS
    de Leon Guillen, Miguel Angel Diaz
    Morales-Rocha, Victor
    Fernandez Martinez, Luis Felipe
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (06) : 635 - 653
  • [6] Security Threats and Challenges to IoT and its Applications: A Review
    Anwar, Raja Waseem
    Zainal, Anazida
    Abdullah, Tariq
    Iqbal, Saleem
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 301 - 305
  • [7] Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT
    Eom, Jung Ho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 347 - 356
  • [8] A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Azmoodeh, Amin
    Dehghantanha, Ali
    Karimipour, Hadis
    Fraser, Evan
    Green, Arthur G.
    Russell, Conor
    Duncan, Emily
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [9] IoT Threats and Solutions with Blockchain and Context-Aware Security Design: A Review
    Doghramachi, Dana F.
    Ameen, Siddeeq Y.
    2021 INTERNATIONAL CONFERENCE OF MODERN TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY INDUSTRY (MTICTI 2021), 2021, : 131 - 138
  • [10] A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
    Abdulghani, Hezam Akram
    Nijdam, Niels Alexander
    Cohen, Anastasija
    Konstantas, Dimitri
    SYMMETRY-BASEL, 2019, 11 (06):