{"id":3744,"date":"2016-10-24T20:07:13","date_gmt":"2016-10-25T00:07:13","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3744"},"modified":"2016-10-24T20:07:13","modified_gmt":"2016-10-25T00:07:13","slug":"root-of-more-iot-based-ddos-attacks","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/24\/root-of-more-iot-based-ddos-attacks\/","title":{"rendered":"&#8216;Root&#8217; Of More IoT-Based DDos Attacks"},"content":{"rendered":"<p>This article discusses the details around the distributed denial-of-service (DDoS) attack that occurred on Friday morning using a large number of Internet of Things devices such as webcams, DVRs, and other smart devices that have minimal security features. Attackers were able to successfully impact the DNS provider Dyn for several hours while interrupting\u00a0many large sites such as Amazon and Twitter. The attack is being labeled as an easy and non-sophisticated attack using simple devices and easily attainable malware.<\/p>\n<p>The attackers used a botnet program called Mirai to gain control of all these devices. Mirai uses simple telnet commands to search for available devices and cycles through\u00a0default login information until it is able to successfully gain access. Unlike normal servers, a\u00a0majority of the IoT devices broadcast their version and model number once you connect to them.<\/p>\n<p>With a large volume of IoT connected devices being added everyday, it raises the new concern of the lack of security in IoT devices. As showed on Friday, we now have to be concerned with a relativity easy attack that criminals can use to disrupt the internet.<\/p>\n<p>http:\/\/www.darkreading.com\/vulnerabilities&#8212;threats\/root-of-more-iot-based-ddos-attacks\/d\/d-id\/1327281?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article discusses the details around the distributed denial-of-service (DDoS) attack that occurred on Friday morning using a large number of Internet of Things devices such as webcams, DVRs, and other smart devices that have minimal security features. Attackers were able to successfully impact the DNS provider Dyn for several hours while interrupting\u00a0many large sites [&hellip;]<\/p>\n","protected":false},"author":11477,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716552],"tags":[],"class_list":{"0":"post-3744","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-09-it-outsourcing-cloud-computing","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11477"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3744"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3744\/revisions"}],"predecessor-version":[{"id":3745,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3744\/revisions\/3745"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}