A Review of the Weaponization of IoT: Security Threats and Countermeasures

Publisher:
IEEE
Publication Type:
Conference Proceeding
Citation:
2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2024, 15, pp. 279-284
Issue Date:
2024-01-01
Filename Description Size
1744086.pdfPublished version970.89 kB
Adobe PDF
Full metadata record
This research paper discusses the current state of Internet of Things IoT security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations This allows attackers to combine the computational power of infected devices to form a botnet which can then be used to carry out Distributed Denial of Service DDoS attacks against specified IP addresses The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users thereby degrading the availability of the target s services and resources This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business related data We will describe what IoT weaponization malware is outline its features and discuss the most common IoT malware currently present on the Internet We will then analyze the Mirai source code to fully understand its qualities including attack types and operations that allowed it to remain effective
Please use this identifier to cite or link to this item: