2021
DOI: 10.48550/arxiv.2104.09041
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The Impact of DoS Attacks onResource-constrained IoT Devices:A Study on the Mirai Attack

Bhagyashri Tushir,
Hetesh Sehgal,
Rohan Nair
et al.

Abstract: Mirai is a type of malware that creates a botnet of internet-connected devices, which can later be used to infect other devices or servers. This paper aims to analyze and explain the Mirai code and create a low-cost simulation environment to aid in the dynamic analysis of Mirai. Further, we perform controlled Denial-of-Service attacks while measuring resource consumption on resource-constrained compromised and victim Internet-of-Things (IoT) devices, such as energy consumption, CPU utilization, memory utilizat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…An investigation of IoT security vulnerabilities has been conducted by Neshenko et al [2], Zhou et al [3], and Panchal et al [4] to discuss numerous attack-types and the corresponding impact on IoT sub-systems. There has been a rapid increase in vulnerable activities that exploit the security gaps of IoT networks [5]. Moreover, there is a huge demand for IoT devices owing to the popularity of microdevices that provide intelligent digital assistance and have been demonstrated to minimize manual labor.…”
Section: Research Domainmentioning
confidence: 99%
“…An investigation of IoT security vulnerabilities has been conducted by Neshenko et al [2], Zhou et al [3], and Panchal et al [4] to discuss numerous attack-types and the corresponding impact on IoT sub-systems. There has been a rapid increase in vulnerable activities that exploit the security gaps of IoT networks [5]. Moreover, there is a huge demand for IoT devices owing to the popularity of microdevices that provide intelligent digital assistance and have been demonstrated to minimize manual labor.…”
Section: Research Domainmentioning
confidence: 99%
“…A single Distributed DoS (DDoS) attack can compromise thousands of devices [88] through Botnets where victims themselves join the attack by being turned into "bots" [89]. An example is the 2016 massive "Mirai" attack that brought down the Domain Name System (DNS) Dyn [90], and blocked access to Netflix, Reddit, Spotify, and Twitter [91], [92] , accessing the equipment of major cybersecurity providers [93], and also congesting IoT and IP networks [94]. Thus as soon as a Botnet attempts an attack, it is crucial to detect it, if possible block it, and especially avoid its propagation and proliferation.…”
Section: Contributions To the Security Of The Iotmentioning
confidence: 99%
“…In addition to network-wide effects, Botnets significantly increase network congestion and power consumption, and processor and memory usage at the device level, hence pos- ing challenges for resource-constrained devices [17]. Thus, given the nefarious impact of Botnets at both network and device level in Massive IoT networks, it is crucial to identify malicious packets and compromised IoT devices in real-time during an attack, so as to prevent the attack from spreading.…”
Section: Introductionmentioning
confidence: 99%