A Review of the Weaponization of IoT: Security Threats and Countermeasures
- Publisher:
- IEEE
- Publication Type:
- Conference Proceeding
- Citation:
- 2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2024, 15, pp. 279-284
- Issue Date:
- 2024-01-01
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
1744086.pdf | Published version | 970.89 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
This research paper discusses the current state of Internet of Things IoT security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations This allows attackers to combine the computational power of infected devices to form a botnet which can then be used to carry out Distributed Denial of Service DDoS attacks against specified IP addresses The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users thereby degrading the availability of the target s services and resources This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business related data We will describe what IoT weaponization malware is outline its features and discuss the most common IoT malware currently present on the Internet We will then analyze the Mirai source code to fully understand its qualities including attack types and operations that allowed it to remain effective
Please use this identifier to cite or link to this item: