2018
DOI: 10.1155/2018/7178164
|View full text |Cite
|
Sign up to set email alerts
|

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

Abstract: The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
4

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 127 publications
(63 citation statements)
references
References 31 publications
0
52
0
4
Order By: Relevance
“…it is difficult to understand that the different incoming requests are actually coordinated by the same source) and generate a huge quantity of traffic [153,32] which makes the attack much more disruptive than a simple SDoS [20]. To have an insight of the potential power of such attack, it is sufficient to consider that the recent Mirai malware allowed to generate traffic peaks of more than 620 Gbps [64,33]. Transport and network level protocols can be used to exhaust network resources [153].…”
Section: Availability Issuesmentioning
confidence: 99%
“…it is difficult to understand that the different incoming requests are actually coordinated by the same source) and generate a huge quantity of traffic [153,32] which makes the attack much more disruptive than a simple SDoS [20]. To have an insight of the potential power of such attack, it is sufficient to consider that the recent Mirai malware allowed to generate traffic peaks of more than 620 Gbps [64,33]. Transport and network level protocols can be used to exhaust network resources [153].…”
Section: Availability Issuesmentioning
confidence: 99%
“…Badacze (De Donno, et al 2018) podkreślają, że bezpieczeństwo Internetu rzeczy zostało źle zaprojektowane. M. Marczyk pisze, że "we współczesnej organizacji jednym z najważniejszych zagrożeń bezpieczeństwa jest możliwość niekontrolowanego dostępu i ujawnienia informacji stanowiącej tajemnicę, najczęściej dotyczy to informacji przetwarzanej w systemach i sieciach teleinformatycznych (sieci komputerowe)" (Marczyk, 2015).…”
Section: Zagrożenia Internetu Rzeczyunclassified
“…Jak skuteczne może być zmasowane niezgodne z przeznaczeniem, funkcjonowanie Internetu rzeczy, zostało opisane w artykule naukowym (De Donno, et al 2018). W październiku 2016 roku botnet Mirai składający się głównie z przejętych kamer CCTV (Waqas, 2016) i głównie w USA sparaliżował fi rmę DNS Dyn, powodując wyłączenie wielu stron postawionych na infrastrukturze na terenie USA.…”
Section: Zagrożenia Internetu Rzeczyunclassified
“…The trick is to introduce into the P2P network many fake identities (the so-called sybils), which are controlled by one single attacker in the physical layer. This allows attackers to monitor the traffic, to partition the network, e.g., through an eclipse attack, or to misuse the DHT in different ways, e.g., performing a Distributed Denial of Service (DDoS) attack [12]. Different types of threats can be generated by the sybils and they can be classified into the following categories: (i) routing table invasions, (ii) storage and retrieval malfunctions, and (iii) miscellaneous attacks [13].…”
Section: Background and Related Workmentioning
confidence: 99%