A Review of the Weaponization of IoT: Security Threats and Countermeasures

Marek Kulbacki, Zenon Chaczko, Sophie Barton, Peter Wajs-Chaczko, Jan Nikodem, Jerzy W. Rozenblit, Ryszard Klempous, Atsushi Ito, Michał Kulbacki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This research paper discusses the current state of Internet of Things (IoT) security in relation to smart bot technology and suggests actions to mitigate IoT weaponization threats. One of the most dangerous cyberattack activities is infecting IoT devices with malware to gain control of their operations. This allows attackers to combine the computational power of infected devices to form a botnet, which can then be used to carry out Distributed Denial of Service (DDoS) attacks against specified IP addresses. The aim is to overwhelm the target IP address servers with requests and prevent them from servicing legitimate requests from other users, thereby degrading the availability of the target's services and resources. This paper aims to analyze IoT DDoS attacks or weaponization of IoT to determine the most effective methods of eliminating such threats and preventing serious damage to IoT infrastructure and business-related data. We will describe what IoT weaponization malware is, outline its features, and discuss the most common IoT malware currently present on the Internet. We will then analyze the Mirai source code to fully understand its qualities, including attack types and operations, that allowed it to remain effective.

Original languageEnglish (US)
Title of host publicationSACI 2024 - 18th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages279-284
Number of pages6
ISBN (Electronic)9798350329513
DOIs
StatePublished - 2024
Event18th IEEE International Symposium on Applied Computational Intelligence and Informatics, SACI 2024 - Timisoara, Romania
Duration: May 23 2024May 25 2024

Publication series

NameSACI 2024 - 18th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings

Conference

Conference18th IEEE International Symposium on Applied Computational Intelligence and Informatics, SACI 2024
Country/TerritoryRomania
CityTimisoara
Period5/23/245/25/24

Keywords

  • Bashlite source code
  • IoT device
  • IoT malware
  • IoT security
  • IoT weaponization
  • Mirai botnet
  • threat actor

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems
  • Electrical and Electronic Engineering
  • Computational Mathematics
  • Health Informatics
  • Statistical and Nonlinear Physics

Fingerprint

Dive into the research topics of 'A Review of the Weaponization of IoT: Security Threats and Countermeasures'. Together they form a unique fingerprint.

Cite this