Analysis of Botnet Countermeasures in IoT Systems

Viktoria Germak, Roman Minailenko
{"title":"Analysis of Botnet Countermeasures in IoT Systems","authors":"Viktoria Germak, Roman Minailenko","doi":"10.32515/2664-262x.2022.6(37).1.77-87","DOIUrl":null,"url":null,"abstract":"The article analyzes the methods of countering botnets in IoT systems. Today, the Internet of Things has become a popular term to describe scenarios in which Internet connectivity and computing power are spread across a multitude of objects, devices, sensors, etc. The main concept of IoT is the ability to connect all kinds of objects (things) that a person can use in everyday life. These objects (things) must be equipped with built-in sensors or sensors that have the ability to process information coming from the environment, exchange it and perform certain actions depending on the received information. The current lack of standards for the protection of such autonomous networks somewhat slows down the introduction of the Internet of Things into everyday life, so there are numerous vulnerabilities in the rapidly growing field of IoT technologies, which are used all over the world. Information protection and confidentiality is one of the priority components when choosing a certain system. Therefore, without adequate confidence in the security and privacy of user data, the IoT system will be uncompetitive. The Internet of Things can cause huge changes in everyday life, bringing a whole new level of comfort to ordinary users. But if the elements of such a system are not properly protected from unauthorized intervention, with the help of a reliable cryptographic algorithm, they will bring harm instead of good, giving cybercriminals a loophole to undermine information security. Since devices with built-in computers store a lot of information about their owner, including the ability to know their exact location, access to such information can help criminals commit a crime. To date, the level of success of botnet countermeasures depends mainly on organizational and political general conditions. Given that the establishment of cooperation or diplomatic agreements takes time, it can be concluded that the establishment of appropriate relations that legitimize cooperation for joint action is not suitable as an ad hoc scheme to combat current attacks. The situation is aggravated, given that modern botnet infrastructures are not under the responsibility of a single entity. In contrast, distributed peer-to-peer networks operate worldwide, so shutting down local parts (often no more than single computers) is not an effective solution. In general, countermeasures that require close cooperation are generally unfeasible today for both technical and political reasons Experts believe that prosecuting botnet developers is unlikely to have a strong impact on the global threat. Instead, botnets need to be fought on a technical level. Proactive measures should be taken by joint efforts of international security groups together with pro-government structures.","PeriodicalId":282084,"journal":{"name":"Central Ukrainian Scientific Bulletin. Technical Sciences","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Central Ukrainian Scientific Bulletin. Technical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32515/2664-262x.2022.6(37).1.77-87","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article analyzes the methods of countering botnets in IoT systems. Today, the Internet of Things has become a popular term to describe scenarios in which Internet connectivity and computing power are spread across a multitude of objects, devices, sensors, etc. The main concept of IoT is the ability to connect all kinds of objects (things) that a person can use in everyday life. These objects (things) must be equipped with built-in sensors or sensors that have the ability to process information coming from the environment, exchange it and perform certain actions depending on the received information. The current lack of standards for the protection of such autonomous networks somewhat slows down the introduction of the Internet of Things into everyday life, so there are numerous vulnerabilities in the rapidly growing field of IoT technologies, which are used all over the world. Information protection and confidentiality is one of the priority components when choosing a certain system. Therefore, without adequate confidence in the security and privacy of user data, the IoT system will be uncompetitive. The Internet of Things can cause huge changes in everyday life, bringing a whole new level of comfort to ordinary users. But if the elements of such a system are not properly protected from unauthorized intervention, with the help of a reliable cryptographic algorithm, they will bring harm instead of good, giving cybercriminals a loophole to undermine information security. Since devices with built-in computers store a lot of information about their owner, including the ability to know their exact location, access to such information can help criminals commit a crime. To date, the level of success of botnet countermeasures depends mainly on organizational and political general conditions. Given that the establishment of cooperation or diplomatic agreements takes time, it can be concluded that the establishment of appropriate relations that legitimize cooperation for joint action is not suitable as an ad hoc scheme to combat current attacks. The situation is aggravated, given that modern botnet infrastructures are not under the responsibility of a single entity. In contrast, distributed peer-to-peer networks operate worldwide, so shutting down local parts (often no more than single computers) is not an effective solution. In general, countermeasures that require close cooperation are generally unfeasible today for both technical and political reasons Experts believe that prosecuting botnet developers is unlikely to have a strong impact on the global threat. Instead, botnets need to be fought on a technical level. Proactive measures should be taken by joint efforts of international security groups together with pro-government structures.
物联网系统中僵尸网络对策分析
本文分析了物联网系统中对抗僵尸网络的方法。如今,物联网已经成为一个流行术语,用来描述互联网连接和计算能力分布在众多对象、设备、传感器等上的场景。物联网的主要概念是连接人们在日常生活中可以使用的各种物体(事物)的能力。这些物体(事物)必须配备内置的传感器或传感器,这些传感器或传感器能够处理来自环境的信息,交换信息并根据接收到的信息执行某些操作。目前缺乏保护这种自主网络的标准,在某种程度上减缓了将物联网引入日常生活的速度,因此在快速发展的物联网技术领域存在许多漏洞,这些技术在世界各地都在使用。在选择某一系统时,信息保护和机密性是优先考虑的因素之一。因此,如果对用户数据的安全性和隐私性没有足够的信心,物联网系统将没有竞争力。物联网可以给日常生活带来巨大的变化,给普通用户带来全新的舒适度。但是,如果在可靠的加密算法的帮助下,这样一个系统的元素没有得到适当的保护,免受未经授权的干预,它们将带来危害而不是好处,给网络犯罪分子提供破坏信息安全的漏洞。由于内置计算机的设备存储了大量关于其所有者的信息,包括知道其确切位置的能力,访问这些信息可以帮助犯罪分子实施犯罪。迄今为止,僵尸网络对策的成功程度主要取决于组织和政治一般条件。鉴于建立合作或外交协定需要时间,可以得出结论,建立适当的关系,使联合行动的合作合法化,不适合作为打击当前攻击的临时计划。鉴于现代僵尸网络基础设施不属于单一实体的责任,这种情况变得更加严重。相比之下,分布式点对点网络在全球范围内运行,因此关闭本地部分(通常不超过一台计算机)并不是一个有效的解决方案。总的来说,由于技术和政治原因,需要密切合作的对策在今天通常是不可行的。专家认为,起诉僵尸网络开发人员不太可能对全球威胁产生重大影响。相反,僵尸网络需要在技术层面上进行战斗。国际安全团体和亲政府团体应共同努力,采取积极措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信