A Review of the Weaponization of IoT: Security Threats and Countermeasures

被引:1
|
作者
Kulbacki, Marek [1 ,2 ]
Chaczko, Zenon [3 ]
Barton, Sophie [3 ]
Wajs-Chaczko, Peter [4 ]
Nikodem, Jan [5 ]
Rozenblit, Jerzy W. [6 ]
Klempous, Ryszard [5 ]
Ito, Atsushi [7 ]
Kulbacki, Michal [8 ]
机构
[1] Polish Japanese Acad Informat Technol, Warsaw, Poland
[2] DIVE IN AI, Wroclaw, Poland
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[4] Macquarie Univ, Sydney, NSW, Australia
[5] Wroclaw Univ Sci & Technol, Wroclaw, Poland
[6] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ USA
[7] Chuo Univ, Hachioji, Tokyo, Japan
[8] Univ Wroclaw, Math Inst, Wroclaw, Poland
来源
18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024 | 2024年
关键词
IoT device; IoT malware; IoT security; Bashlite source code; IoT weaponization; threat actor; Mirai botnet; INTERNET; THINGS; CHALLENGES;
D O I
10.1109/SACI60582.2024.10619778
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research paper discusses the current state of Internet of Things (IoT) security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats. One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations. This allows attackers to combine the computational power of infected devices to form a botnet, which can then be used to carry out Distributed Denial of Service (DDoS) attacks against specified IP addresses. The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users, thereby degrading the availability of the target's services and resources. This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business-related data. We will describe what IoT weaponization malware is, outline its features, and discuss the most common IoT malware currently present on the Internet. We will then analyze the Mirai source code to fully understand its qualities, including attack types and operations, that allowed it to remain effective.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [21] Security Threats, Countermeasures, and Challenges of Digital Supply Chains
    Hammi, Badis
    Zeadally, Sherali
    Nebhen, Jamel
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [22] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918
  • [23] Security Threats of Embedded Systems in IoT Environment
    Rajendran, Sreeja
    Lourde, R. Mary
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 745 - 754
  • [24] Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions
    Mekala, Sri Harsha
    Baig, Zubair
    Anwar, Adnan
    Zeadally, Sherali
    COMPUTER COMMUNICATIONS, 2023, 208 : 294 - 320
  • [25] Security Attacks and Countermeasures on Cloud Assisted IoT Applications
    Alsaidi, Asma
    Kausar, Firdous
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 213 - 217
  • [26] Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets
    Nazir, Ahsan
    He, Jingsha
    Zhu, Nafei
    Wajahat, Ahsan
    Ma, Xiangjun
    Ullah, Faheem
    Qureshi, Sirajuddin
    Pathan, Muhammad Salman
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [27] Survey on Security Threats in Agricultural IoT and Smart Farming
    Demestichas, Konstantinos
    Peppes, Nikolaos
    Alexakis, Theodoros
    SENSORS, 2020, 20 (22) : 1 - 17
  • [28] Cyber Security Threats to IoT Applications and Service Domains
    Tweneboah-Koduah, Samuel
    Skouby, Knud Erik
    Tadayoni, Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (01) : 169 - 185
  • [29] Security Threats and Issues in Automation IoT
    Varga, Pal
    Plosz, Sandor
    Soos, Gabor
    Hegedus, Csaba
    2017 IEEE 13TH INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2017), 2017,
  • [30] A review study on blockchain-based IoT security and forensics
    Kamal, Randa
    Hemdan, Ezz El-Din
    El-Fishway, Nawal
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (30) : 36183 - 36214