2019
DOI: 10.1007/978-3-030-12971-2_8
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Contained Testbed for Analyzing IoT Botnets

Abstract: Many security issues have come to the fore with the increasingly widespread adoption of Internet-of-Things (IoT) devices. The Mirai attack on Dyn DNS service, in which vulnerable IoT devices such as IP cameras, DVRs and routers were infected and used to propagate large-scale DDoS attacks, is one of the more prominent recent examples. IoT botnets, consisting of hundredsof-thousands of bots, are currently present "in-the-wild" at least and are only expected to grow in the future, with the potential to cause sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 11 publications
0
3
0
1
Order By: Relevance
“…IoT-based botnets are able to benefit from a number of advantages not typically available to their traditional counterparts. Many IoT devices are poorly secured not having default credentials changed or not having their firmware updated [7,19]. These devices are also numerous: the number of IoT devices is predicted to reach over 50 billion devices by 2050 [20].…”
Section: Botnet Structures and Operationsmentioning
confidence: 99%
“…IoT-based botnets are able to benefit from a number of advantages not typically available to their traditional counterparts. Many IoT devices are poorly secured not having default credentials changed or not having their firmware updated [7,19]. These devices are also numerous: the number of IoT devices is predicted to reach over 50 billion devices by 2050 [20].…”
Section: Botnet Structures and Operationsmentioning
confidence: 99%
“…A maioria dos testbeds de cibersegurança na literatura é baseada em técnicas de virtualização [Kumar and Lim 2018]. Aqueles voltados à IoT são específicos para uma aplicação [Muchtar et al 2018, Gunduz andDas 2018] e não suportam experimentos de cibersegurança ou não compreendem os dados do tráfego de rede [Gyrard and Serrano 2015].…”
Section: Trabalhos Relacionadosunclassified
“…Kumar and Lim built a testbed that will be used to evaluate IoT botnets. The authors further designed a mitigation technique that will be used against them [17]. The name of this testbed proposed is DETERLAB-based IoT testbed.…”
Section: A Rq1:what Are the Contributions Of The Primary Studies?mentioning
confidence: 99%