IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets

Leona McNulty, V. Vassilakis
{"title":"IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets","authors":"Leona McNulty, V. Vassilakis","doi":"10.1109/CSNDSP54353.2022.9908039","DOIUrl":null,"url":null,"abstract":"In recent years, the world has witnessed a significant increase in the number of IoT devices, with a global and continuous rise in the demand for their multi-purpose applications. However, malicious use of IoT devices began to emerge among cybercriminals. IoT-enabled cyberattacks and botnets, such as the Mirai botnet and its variants and imitators, demonstrate that the industry needs to better secure IoT devices and networks; otherwise, there will be higher risks of exposing the Internet’s infrastructure and services to increasingly disruptive DDoS attacks. This paper presents the results of a study of IoT botnets. We focus on their distinctive characteristics, exploits used, and cyberattack capabilities. In total, we have reviewed and compared 46 recent IoT botnets. We also present details of the main CPU architectures targeted by these IoT botnets. We illustrate that IoT botnets pose a significant threat to private individuals and enterprises by employing effective evasion mechanisms, encrypted communication, and targeting a wide range of systems and networks.","PeriodicalId":288069,"journal":{"name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNDSP54353.2022.9908039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In recent years, the world has witnessed a significant increase in the number of IoT devices, with a global and continuous rise in the demand for their multi-purpose applications. However, malicious use of IoT devices began to emerge among cybercriminals. IoT-enabled cyberattacks and botnets, such as the Mirai botnet and its variants and imitators, demonstrate that the industry needs to better secure IoT devices and networks; otherwise, there will be higher risks of exposing the Internet’s infrastructure and services to increasingly disruptive DDoS attacks. This paper presents the results of a study of IoT botnets. We focus on their distinctive characteristics, exploits used, and cyberattack capabilities. In total, we have reviewed and compared 46 recent IoT botnets. We also present details of the main CPU architectures targeted by these IoT botnets. We illustrate that IoT botnets pose a significant threat to private individuals and enterprises by employing effective evasion mechanisms, encrypted communication, and targeting a wide range of systems and networks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网僵尸网络:特征、漏洞、攻击能力和目标
近年来,全球物联网设备数量显著增加,对其多用途应用的需求全球持续增长。然而,恶意使用物联网设备开始在网络犯罪分子中出现。支持物联网的网络攻击和僵尸网络,如Mirai僵尸网络及其变体和模仿者,表明行业需要更好地保护物联网设备和网络;否则,互联网的基础设施和服务将面临越来越具有破坏性的DDoS攻击的更高风险。本文介绍了物联网僵尸网络研究的结果。我们专注于它们的独特特征、利用和网络攻击能力。我们总共审查并比较了46个最近的物联网僵尸网络。我们还详细介绍了这些物联网僵尸网络针对的主要CPU架构。我们说明了物联网僵尸网络通过采用有效的规避机制,加密通信以及针对广泛的系统和网络对个人和企业构成重大威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Adaptive Visible Light Positioning with MSE Inner Loop for Underwater Environment Fibre Optics Biosensors for the Detection of Bacteria – a review Experimental characterization of sub-pixel underwater optical camera communications Energy aware routing protocol for sparse underwater acoustic wireless sensor network iDAM: A Distributed MUD Framework for Mitigation of Volumetric Attacks in IoT Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1