Presentation Material
Abstract
IoT botnets are deployed heavily to perform nefarious activities by circumventing the integrity of the IoT device to launch sophisticated targeted or broad-based attacks. IoT botnets have enhanced the cybercrime operations to a great extent, thereby making it easier for the attackers to carry out unauthorized activities on the Internet. In this talk, Aditya will perform an empirical analysis to conduct a characteristic study of IoT botnets to understand the inherent design, architecture, and associated operations. Code samples will be dissected to highlight the inherent nefarious operations performed by the IoT bots. The study covers analysis of multiple IoT botnet families.
AI Generated Summary
The talk focuses on the security of Internet of Things (IoT) devices, specifically the threats posed by IoT botnets. The researcher presented an overview of the current state of IoT security, highlighting the increasing number of connected devices (estimated to reach 50 billion by 2020) and the corresponding rise in potential vulnerabilities.
Key findings include the discovery of various IoT botnets, such as Mirai, which have been used to launch distributed denial-of-service (DDoS) attacks. The researcher analyzed the code and functionality of these botnets, identifying features such as reverse shells, busybox execution, and data encryption.
The talk also covered the taxonomy of IoT malware, including device type, firmware, and architecture. The researcher emphasized the importance of understanding the threat model and building threat models around IoT devices to anticipate potential attacks.
Practical implications of the research include the need for improved security measures, such as secure coding practices, secure firmware updates, and network-level protections. The researcher also highlighted the importance of collaboration and information sharing within the security community to stay ahead of emerging threats.
Overall, the talk provided a comprehensive overview of the IoT security landscape, highlighting the complexities and challenges associated with securing these devices. The researcher’s findings and insights can inform the development of more effective security solutions and strategies for protecting against IoT-based threats.