Open Access   Article Go Back

IoT Devices are Being Weaponized for DDoS Attacks

Sapna Rawat1 , Md Tabrez Nafis2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-9 , Page no. 22-25, Sep-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i9.2225

Online published on Sep 30, 2019

Copyright © Sapna Rawat, Md Tabrez Nafis . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sapna Rawat, Md Tabrez Nafis, “IoT Devices are Being Weaponized for DDoS Attacks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.22-25, 2019.

MLA Style Citation: Sapna Rawat, Md Tabrez Nafis "IoT Devices are Being Weaponized for DDoS Attacks." International Journal of Computer Sciences and Engineering 7.9 (2019): 22-25.

APA Style Citation: Sapna Rawat, Md Tabrez Nafis, (2019). IoT Devices are Being Weaponized for DDoS Attacks. International Journal of Computer Sciences and Engineering, 7(9), 22-25.

BibTex Style Citation:
@article{Rawat_2019,
author = {Sapna Rawat, Md Tabrez Nafis},
title = {IoT Devices are Being Weaponized for DDoS Attacks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2019},
volume = {7},
Issue = {9},
month = {9},
year = {2019},
issn = {2347-2693},
pages = {22-25},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4842},
doi = {https://doi.org/10.26438/ijcse/v7i9.2225}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.2225}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4842
TI - IoT Devices are Being Weaponized for DDoS Attacks
T2 - International Journal of Computer Sciences and Engineering
AU - Sapna Rawat, Md Tabrez Nafis
PY - 2019
DA - 2019/09/30
PB - IJCSE, Indore, INDIA
SP - 22-25
IS - 9
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
433 452 downloads 188 downloads
  
  
           

Abstract

The Internet of Things revolutions have made our live stress-free and better by giving us economical services. It always keeps us connected to the embedded system and provides value added services to humans as per their requirements. As per the research, 5 billion devices are already connected with the internet and these numbers will increase to 20 billion in few years. As we know that every cloud has a silver lining, same goes for Internet of Things. IoT devices are becoming a primary object for hacker, it is continuously alluring the attacker or intruder who tries to harness and exploit the devices. Top security concerns of IoT devices are Sensitive information disclosure, Denial of service attack, Tampering of Data and privilege escalation. Internet of Things use cloud servers to exchange information from one device to another device. But if an attacker successfully exploits the vulnerability, it could easily access, read or modify the data while performing the men in middle attack. Moreover malicious user can use this data that can cause potential damage to the targeted organization and can use it for their personal financial gain. This article provides the guidance for best practices to mitigate the DDOS attack and examine their interrelationships.

Key-Words / Index Term

Internet of Things (IoT), Denial of Service(DOS), Distributed Denial of Service(DDOS), Internet Security, Wireless Security, Spoofing, Secure Routing, IoT Security, Controller, Secure Forwarding Cloud, Device, Sensor, Encrypted session key, Firewall, HTTP/S, Filtering, DNS, BGP, Null routing, BIG-IP server, VoIP or FTP

References

[1] Constantinos Kolias, Georgios Kambourakis, and Angelos Stavrou “DDoS in the IoT: Mirai and Other Botnets”, 07 July 2017, IEEE, INSPEC Accession Number: 17012613. For Journal
[2] Linux/AES. DDoS: “Router Malware Warning - Reversing an AR March ELF,” MalwareMustDie! Blog, 2014.
[3] Danny Palme, IoT security warning: Cyber-attacks on medical devices could put patients at risk, DOI: 10.1145/2667218, Communications of the ACM 58(4):74-82 • April 2015.
[4] D. Bekerman, “New Mirai Variant Launches 54 Hour DDoS Attack against US College,” blog, Imperva Incapsula, 29 Mar. 2017.
[5] SoniaLaskara, DhirendraMishra “Qualified Vector Match andMerge Algorithm (QVMMA) for DDoS Prevention and Mitigation”. ELSEVIER, India, Volume 79, 2016.
[6] S. Edwards and I. Profetis, “Hajime: Analysis of a Decentralized Internet Worm for IoT Devices,” Rapidity Networks; 16Oct.2016.
[7] Prabhakaran Kasinathan; Claudio Pastrone; Maurizio A.Spirito; Mark Vinkovits, Denial-of-Service detection in 6LoWPAN based Internet of Things.
[8] Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou “The Mirai botnet and the IoT Zombie Armies”,MILCOM- 2017 IEEE Military Communications Conference (MILCOM).
[9] Michele De Donno, Nicola Dragoni, Alberto Giaretta, “Analysis of DDoS-capable IoT malwares”, 2017 Federated Conference on Computer Science and Information Systems (FedCSIS).
[10] Natalija Vlajic, Daiwei Zhou “IoT as a Land of Opportunity for DDoS Hackers” C. Kolias et al. Published in: Computer Volume: 51, Issue: 7, July 2018.
[11] M Devendra Prasad1, Prasanta Babu V2, C Amarnath3“Machine Learning DDoS Detection Using Stochastic Gradient Boosting” Volume-7, Issue-4, Page no. 157-166, Apr-2019.
[12] Michele De Donno, 1 Nicola Dragoni, 1, 2 Alberto Giaretta, 2 and Angelo Spognardi3 “DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation” Volume 2018, Article ID 7178164.
[13] Swaroop P T1, Mrs. Chaitra H K “Internet of Things: Smart” College, Volume-4, Special Issue-3, May 2016.