scholarly journals Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT

2018 ◽  
Vol 30 (4) ◽  
pp. e3505 ◽  
Author(s):  
Jeffrey Spaulding ◽  
Jeman Park ◽  
Joongheon Kim ◽  
DaeHun Nyang ◽  
Aziz Mohaisen
IoT ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 236-248
Author(s):  
Andrew John Poulter ◽  
Simon J. Cox

Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This paper examines this problem in the context of IoT devices operating within C2 systems which do not have a trusted relationship with each other. We propose a solution which we call syndication, to provide a controlled mechanism to share data between C2 systems of devices without a fully trusted relationship. This paper builds upon previous work which established a lightweight protocol for secure C2 operations within the IoT. Using the proposed approach enables not only sharing of data but also permits the external controller to submit moderated requests for actions to be performed. The paper concludes by examining how this approach could also be adopted to provide secure guest access to connected systems in a domestic or commercial context.


Information ◽  
2020 ◽  
Vol 11 (11) ◽  
pp. 516
Author(s):  
Shingo Yamaguchi

This paper proposes a new kind of cyber-security system, named Botnet Defense System (BDS), which defends an Internet of Things (IoT) system against malicious botnets. The concept of BDS is “Fight fire with fire”. The distinguishing feature is that it uses white-hat botnets to fight malicious botnets. A BDS consists of four components: Monitor, Strategy Planner, Launcher, and Command and Control (C&C) server. The Monitor component watches over a target IoT system. If the component detects a malicious botnet, the Strategy Planner component makes a strategy against the botnet. Based on the planned strategy, the Launcher component sends white-hat worms into the IoT system and constructs a white-hat botnet. The C&C server component commands and controls the white-hat botnet to exterminate the malicious botnet. Strategy studies are essential to produce intended results. We proposed three basic strategies to launch white-hat worms: All-Out, Few-Elite, and Environment-Adaptive. We evaluated BDS and the proposed strategies through the simulation of agent-oriented Petri net model representing the battle between Mirai botnets and the white-hat botnets. This result shows that the Environment-Adaptive strategy is the best and reduced the number of needed white-hat worms to 38.5% almost without changing the extermination rate for Mirai bots.


2020 ◽  
Vol 8 (6) ◽  
pp. 3306-3310

IoT is defined as smart machines collaborating and communicating with different gadgets, objects, environments and framework, resulting in amount of data generated and that processed the data into useful actions which can be used to command and control things and ultimately help human beings to make life easier. IoT platforms play a central role within this evolution by providing significant building blocks. Major building blocks used in IoT is sensor. Sensors play an important role in IoT that allows the Internet of Things (IoT) by collecting the data for wiser decisions. This paper reviews various types of IoT sensors along with its application.


Sign in / Sign up

Export Citation Format

Share Document