1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: DDoS attacks using IoT devices follow The Manchurian Candidate model

Discussion in 'Network World' started by RSS, Oct 7, 2016.

  1. RSS

    RSS New Member Member

    In the movie The Manchurian Candidate, two soldiers are kidnapped and brainwashed into sleeper agents. Later the soldiers become unwitting assassins when activated by a handler.

    Sound familiar? It should.

    Hackers use a similar model for Distributed Denial of Service (DDoS) attacks using IoT devices. This process has four phases.

    1. Capture: Identify and take over control of IoT devices
    2. Subvert: Reprogram the device to conduct malicious acts
    3. Activate: Instruct the hacked device to launch attack
    4. Attack: Launch the DDoS attack

    Why are such attacks increasing? How can IoT device security be hardened? What DDoS protections are available? What advisory resources are available? Let’s take a look.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page