Explore chapters and articles related to this topic
Systems Seams, Boundaries, and the IoT Ecosystem
Published in Chuck Benson, Managing IoT Systems for Institutions and Cities, 2019
F5 Labs goes on to report that the destructive Mirai malware – designed specifically to attack and subsequently use IoT devices in further attacks – still has a strong global presence. The F5 Labs report provides three reasons for the ongoing Mirai presence: Many of the attacked IoT devices have no way of implementing firmware updatesThe infected IoT devices are often owned/operated by people without the technical skills to appropriately configure themMany of the infected IoT devices are on telecom networks and telecoms are not financially motivated to disconnect them because that would also disconnect regular paying services.
Internet of Things (IoT)
Published in Prashant Ranjan, Ram Shringar Rao, Krishna Kumar, Pankaj Sharma, Wireless Communication, 2023
Prashant Ranjan, Ram Shringar Rao, Krishna Kumar, Pankaj Sharma
The IoT connects billions of devices and involves the massive data points to the internet. All this data needs to be secured. Due to significant exposure, IoT security privacy is a major concern. In 2016, one of the most infectious IoT attacks, Mirai, a botnet that intruded the domain name server provider Dyn. This attack turned down many websites for a long duration in one of the most significant DDoS attacks ever experienced. Hackers got access to the network by exploiting weakly secured IoT devices. The threat posed by IoT botnets, such as Mirai to unsecured IoT devices remains very high.
Modern Machine Learning and IoT Applications for Personalized Healthcare:
Published in Pushpa Singh, Divya Mishra, Kirti Seth, Transformation in Healthcare with Emerging Technologies, 2022
P. Sriramalakshmi, Shreyaa Parvath Rajkumar, R. Nivedhithaa
Usually, manufacturers prioritize cost savings over security. Therefore the IoT devices do not have enough space to perform upgrades as they use smaller hard disks to reduce cost. This design flaw resulted in a cascade of ramifications that led into the devastating 2016 Mirai botnet attack, which caused the temporary shut down of the websites of major commercial tech companies, including Twitter, Netflix, and Spotify (Surya, 2016). If something similar to this incident happens in the healthcare sector, it may result in fatal consequences.
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data
Published in Enterprise Information Systems, 2023
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota
As long as the devices are connected to the network, they need security measures just like PCs and smartphones. Otherwise, IoT devices will become an easy target for cyber attacks. For example, in 2016, the Mirai botnet was formed by unsecured devices, which led to Distributed Denial of Service (DDoS) attacks (Kolias et al. 2017; Antonakakis et al. 2017). And there have also been variants of Mirai since then, such as Hajime (Herwig et al. 2019). The more IoT devices and users there are, the more threatening the attacks by such infected devices become. Ransomware that targets IoT devices has also emerged(Humayun et al. 2021). One of the threats by infected devices include attacks on power grids by infected devices, which may affect various infrastructures in our lives (Soltan, Mittal, and Poor 2018; Kimani, Oduol, and Langat 2019; Ahmed et al. 2019).
Radical systems thinking and the future role of computational modelling in ergonomics: an exploration of agent-based modelling
Published in Ergonomics, 2020
Matt Holman, Guy Walker, Terry Lansdown, Adam Hulme
The rapid and widespread adoption of IoT devices is ushering in an era where cloud-based CPSs will likely dominate industrial, commercial and domestic spheres (Colombo et al. 2017). Cloud-based industrial CPSs have already materialised in the transport, energy and manufacturing sectors (Colombo et al. 2014; Wu et al. 2015). The breadth and depth of this IoT ‘system of systems’ will enable a multiplicity of routes for local perturbations to cascade into massive systemic effects. The 2016 Dyn cyberattack offered an alarming insight into the vulnerability of the increasingly vast and interconnected IoT network. Approximately 100,000 IoT devices (including printers, baby monitors, security cameras, and electronic gates) were hacked using Mirai, a type of malware that turns networked devices into ‘bots’ whose behaviour can be coordinated into a ‘botnet’ to carry out Distributed Denial of Service (DDoS) attacks to disrupt the normal flow of internet traffic (Hilton 2016; Scott and Spaniel 2016). The Dyn DDoS attacks affected major service platforms such as Facebook, Amazon and Twitter, including the web services of major networks such as BBC, Fox News and The Guardian. Whilst the Dyn attack provided an alarming insight into the vulnerability of networked IoT systems, its impacts were not directly couched in ‘physical space’ and were thus largely benign (Scott and Spaniel 2016). Arguably, the symbolic impact of how easily IoT devices were compromised was far greater, as it brought to attention the viability of a novel and disturbing class of threat; cyber-physical attacks (CPAs).
Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices
Published in Automatika, 2021
Yong-joon Lee, Hwa-sung Chae, Keun-wang Lee
Additionally, some IoT malwares have already become notorious around the globe. One example is Mirai malware, which rendered several high-profile websites such as Reddit and GitHub inaccessible [5]. According to the DDoS Weapon Report, published in the 4th quarter of 2018, five of the top-ranking malwares for IoT devices that are blocked by security systems belong in the Mirai category. Reported attacks on Xbox Live and the PlayStation Network are from a sixth type of malware [6].