A Review of the Weaponization of IoT: Security Threats and Countermeasures

被引:1
|
作者
Kulbacki, Marek [1 ,2 ]
Chaczko, Zenon [3 ]
Barton, Sophie [3 ]
Wajs-Chaczko, Peter [4 ]
Nikodem, Jan [5 ]
Rozenblit, Jerzy W. [6 ]
Klempous, Ryszard [5 ]
Ito, Atsushi [7 ]
Kulbacki, Michal [8 ]
机构
[1] Polish Japanese Acad Informat Technol, Warsaw, Poland
[2] DIVE IN AI, Wroclaw, Poland
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW, Australia
[4] Macquarie Univ, Sydney, NSW, Australia
[5] Wroclaw Univ Sci & Technol, Wroclaw, Poland
[6] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ USA
[7] Chuo Univ, Hachioji, Tokyo, Japan
[8] Univ Wroclaw, Math Inst, Wroclaw, Poland
来源
18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024 | 2024年
关键词
IoT device; IoT malware; IoT security; Bashlite source code; IoT weaponization; threat actor; Mirai botnet; INTERNET; THINGS; CHALLENGES;
D O I
10.1109/SACI60582.2024.10619778
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research paper discusses the current state of Internet of Things (IoT) security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats. One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations. This allows attackers to combine the computational power of infected devices to form a botnet, which can then be used to carry out Distributed Denial of Service (DDoS) attacks against specified IP addresses. The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users, thereby degrading the availability of the target's services and resources. This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business-related data. We will describe what IoT weaponization malware is, outline its features, and discuss the most common IoT malware currently present on the Internet. We will then analyze the Mirai source code to fully understand its qualities, including attack types and operations, that allowed it to remain effective.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [41] Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
    Krichen, Moez
    Adoni, Wilfried Yves Hamilton
    Mihoub, Alaeddine
    Alzahrani, Mohammed Y.
    Nahhal, Tarik
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 184 - 189
  • [42] Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
    Altulaihan, Esra
    Almaiah, Mohammed Amin
    Aljughaiman, Ahmed
    ELECTRONICS, 2022, 11 (20)
  • [43] Comprehensive Study of IoT Vulnerabilities and Countermeasures
    Coston, Ian
    Plotnizky, Eadan
    Nojoumian, Mehrdad
    APPLIED SCIENCES-BASEL, 2025, 15 (06):
  • [44] A Security Framework for IOT Devices Against Wireless Threats
    Gupta, Himanshu
    Varshney, Garima
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 318 - 323
  • [45] An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security
    Iqbal, Waseem
    Abbas, Haider
    Daneshmand, Mahmoud
    Rauf, Bilal
    Bangash, Yawar Abbas
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) : 10250 - 10276
  • [46] The Security Issues in IoT - Cloud: A Review
    Almolhis, Nawaf
    Alashjaee, Abdullah Mujawib
    Duraibi, Salahaldeen
    Alqahtani, Fahad
    Moussa, Ahmed Nour
    2020 16TH IEEE INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2020), 2020, : 191 - 196
  • [47] IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
    Meneghello, Francesca
    Calore, Matteo
    Zucchetto, Daniel
    Polese, Michele
    Zanella, Andrea
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8182 - 8201
  • [48] IoT Attacks Countermeasures: Systematic Review and Future Research Direction
    Ibibo, Joshua Teddy
    BIG DATA TECHNOLOGIES AND APPLICATIONS, EAI INTERNATIONAL CONFERENCE, BDTA 2023, 2024, 555 : 95 - 111
  • [49] IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework
    Wheelus, Charles
    Zhu, Xingquan
    IOT, 2020, 1 (02): : 259 - 285
  • [50] Survey on 5G Physical Layer Security Threats and Countermeasures
    Harvanek, Michal
    Bolcek, Jan
    Kufa, Jan
    Polak, Ladislav
    Simka, Marek
    Marsalek, Roman
    SENSORS, 2024, 24 (17)