Reference Hub4
Malware Threat in Internet of Things and Its Mitigation Analysis

Malware Threat in Internet of Things and Its Mitigation Analysis

Copyright: © 2020 |Pages: 17
ISBN13: 9781522597421|ISBN10: 1522597425|ISBN13 Softcover: 9781522597438|EISBN13: 9781522597445
DOI: 10.4018/978-1-5225-9742-1.ch016
Cite Chapter Cite Chapter

MLA

Yamaguchi, Shingo, and Brij Gupta. "Malware Threat in Internet of Things and Its Mitigation Analysis." Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, IGI Global, 2020, pp. 363-379. https://doi.org/10.4018/978-1-5225-9742-1.ch016

APA

Yamaguchi, S. & Gupta, B. (2020). Malware Threat in Internet of Things and Its Mitigation Analysis. In R. Joshi & B. Gupta (Eds.), Security, Privacy, and Forensics Issues in Big Data (pp. 363-379). IGI Global. https://doi.org/10.4018/978-1-5225-9742-1.ch016

Chicago

Yamaguchi, Shingo, and Brij Gupta. "Malware Threat in Internet of Things and Its Mitigation Analysis." In Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, 363-379. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9742-1.ch016

Export Reference

Mendeley
Favorite

Abstract

This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web site “Krebs on Security” came under a massive distributed denial of service (DDoS) attack. It reached twice the size of the largest attack in history. This attack was caused by a new type of malware called Mirai. Mirai primarily targets IoT devices such as security cameras and wireless routers. IoT devices have some properties which make them malware attack's targets such as large volume, pervasiveness, and high vulnerability. As a result, a DDoS attack launched by infected IoT devices tends to become massive and disruptive. Thus, the threat of Mirai is an extremely important issue. Mirai has been attracting a great deal of attention since its birth. This resulted in a lot of information related to IoT malware. Most of them came from not academia but industry represented by antivirus software makers. This chapter summarizes such information.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.