IoT BOTNETS

LiveRoom
3 min readJul 29, 2019

IoT Botnets is abbreviated as the Internet Of Things Botnets. IoT Botnet is a set of computers, electronic devices and internet connected devices that are being hacked for some illegal purposes by a troop to hack the activities done by the opponents. It is a wide range of attacks, where the whole team of the victims is caught by the hacker without any evidence. Here the victims are targeted with a lot of architectures and executed prepackaged tool-kits.

BOTNET ATTACKS

Botnets attacks are mainly done by the troop of hackers where the owner will not have a single idea that he/she is being a part of the victim list. So far the Botnets are mainly categorized into five types based on Command and Control (C&C) channel. They are:

1. IRC Botnet (Internet Relay Chat)

2. P2P Botnet (Peer To Peer)

3. HTTP Botnet

4. Mobile Botnet

5. Botnet Cloud

Here the botnets are divided into such categories because the program is developed by the ways and techniques used.

  1. IRC Botnet: IRC related botnets are made using a centralized system to monitor the victim in order to perform malicious activities and the targeted bots are controlled by the main C&C channel
  2. P2P Botnet: It’s done using P2P protocols and a decentralized system with a network of nodes which keeps it alive, with the attacked bots along with all relevant data transmission.
  3. HTTP Botnet: HTTP Botnets is a centralized system based structure and the attack is done using the HTTP protocol. As the C&C server, the bots use a specific URL and IP addresses mentioned by the main botmaster. Hackers use these attacks for thefts of financial purposes
  4. Mobile Botnet: This attack is done using the texting, Bluetooth services and some sharing activities using mobile phones. This is a way where the botmaster can easily access the data using the C&C Channel.
  5. Botnet Cloud: This is a major challenging task hence the botmaster creates and handles the bots using the cloud service so the bots are in a major risk where they could be identified.
Botnet Architecture

Overview of botnet

As everyone knows, hacking which is either a small one or a massive one, it can be harmful to the targeted victim.

Hence botnets are a hinder type of attacking way, they are more harmful and they can also create a massive change in the routine of the targeted.

Here the zombies attack the bots in a way where they could not even identify all of their information being stolen.

The clients and networks related to IoT(Internet of Things) are being hacked, where they are fallen to trap without any knowledge and reason.

Due to this attack, many websites are fallen to trap. And finally, heavy traffic is created for all the high profile websites.

IoT- Based botnets

Countermeasures to avoid IoT BOTNET :

  1. The network should have proper security measures.
  2. Should use a firewall and advanced way of login to access the data.
  3. There should always be a detection method when a malicious software or any authentication arrives.
  4. Blacklisting also can be a measure taken to avoid the suspicious activities and entries done to the websites to block them and avoid the traffic caused.
  5. All the system and loT devices should make the software patches perfectly with the up-to-date security software.
  6. Use Anti Botnet Tools.

Therefore, IoT botnets are now becoming a danger threat where we could not find out how hackers use the functionalities of devices in a malicious way. IoT Botnets can only be stopped by creating awareness among consumers, manufacturers and IT pros.

On behalf of LiveRoom, written by Nibishna Ram

--

--