Fixing the average internet user’s IoT Vulnerabilities

نویسنده

  • Calvin Hendriks
چکیده

For the last couple of years, the Internet of Things (IoT) has grown rapidly. Often, the objects connected to the IoT contain security vulnerabilities, which can be exploited to perform Distributed Denial of Service (DDoS) attacks. The problem is that most of these devices are owned by non-technical skilled users which do not know their devices are comprised and, if known, do not know how to act in order to protect them. This paper aims to raise the awareness of the average Internet user on the misusage of their IoT devices to perform DDoS Attacks. We propose an easy to use methodology that enables non-technical users to discover the vulnerabilities in their IoT devices and protect themselves against them.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glarin...

متن کامل

SPIN: a User-centric Security Extension for In-home Networks

We present our ongoing work on a system to curb the security risks that the Internet of Things (IoT) is widely expected to introduce in smart homes, such as exposing large numbers of vulnerable IoT devices that can be misused for massive DDoS attacks on core Internet systems. Our system for Security and Privacy for Inhome Networks (SPIN) extends a user’s home network with network-level function...

متن کامل

Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities

Although the quantity of services and devices regarding the Internet of Things (IoT) is consistently increasing, not many people are aware that software vulnerabilities are also proliferating at an alarming rate along with the spread of IoT. In addition, for people without security backgrounds, defending their devices against these vulnerabilities is also a huge challenge. IoTcube, an automated...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

A context-aware search system for Internet of Things based on hierarchical context model

In recent years, numerous sensing devices and wireless networks are immersed into our living environments, creating the Internet of Things (IoT) integrating the cyber and physical objects. Searching for objects in IoT is a challenging problem because the context relationships among IoT objects are various and complex. The traditional web search approaches cannot work well in the IoT search doma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017