Menu

IoT FEATURE NEWS

Stopping Mirai DDoS: What Consumers and Developers Can Do

By

There’s been a lot of buzz in the news about the huge Mirai DDoS attack that took down the Krebs security blog.  It used IoT gadgets like IP cameras, DVRs, printers and routers as bots to create an attack of over 600 gigabits per second of time-wasting network traffic. The code for this type of attack has now been released as open source, which means we can expect more such attacks in future. This begs the question - What can we as the IoT community do to mitigate these types of attacks? At infiswift, security is paramount and we’ve thought a bit about best practices to curb and respond to DDoS attacks like this in the future.  Here are our thoughts.

As a consumer of IoT devices and services:

  • Change the default passwords on devices like routers, printers, IP cameras and thermostats at your home and office. A good password is one that’s easy for you to remember but very hard to guess due to meaningless combination of words and numbers for example “typhoon42advil”.
  • Turn off unnecessary features and access. For example, turn off remote administration on your devices and unused protocols or services like ICMP and WPS. Also, close network ports that are not absolutely needed.

These two steps can prevent an attacker from remotely taking control of your devices and using them for an attack. Of course stronger security also prevents other attackers from spying on or taking control of your home network. The main issue on the consumer side is that manufacturers and developers have not made taking these actions very easy or customer friendly, which brings us to what developers can do.

As an IoT developer:

  • Enable security by default: Consumers generally prefer convenience over security, so it’s up to the developer to setup security as default.
  • Reduce the attack surface area: One example is instead of always keeping a port on, only turn it on when needed based on a signal from an existing connection and close it after the job is done.
  • Adopt the Principle of Least Privileges: Run a piece of code with the minimal privileges it needs and nothing more. For example, don’t run code that doesn’t require root privileges as root. Instead, create another user with restricted access to the services and system that’s just enough to run the code.
  • Use Source Code Analysis Tools: These can catch issues before shipping code for a release. For example, buffer overruns and integer overflows can be easy targets for an attacker to use as entry points for remote code execution.
  • Use defense-in-depth strategy: Don’t just have one layer of defense. Instead, have multiple layers like two factor authentication so an attacker cannot just break one layer and bring down the whole system.
  • Run your services behind solid DDoS mitigation services.

There have been many advances in terms of protocols and technologies to provide better security over the last few years, so why do we still have these types of attacks? Well, it doesn’t matter what the strongest part of your system is, rather, it’s the weakest link that attackers go for. That old router in the basement which you never bothered with, that old server in your network which you thought would be used to test something, those are the culprits and they’re everywhere. Although it’s not spring cleaning time now, incidents such as the Mirai DDoS are a good reminder for us to do some, hmmm…, fall cleaning!




Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

Securing Reliability in IoT: Memfault Highlights a Lack of Proactive Measures

By: Alex Passett    4/25/2024

New data released from IoT reliability platform Memfault just earlier this morning highlights the importance of proactivity when engineering IoT solut…

Read More

Spur Measurable IoT Growth through Viasat's ELEVATE Program - Registration for its ELEVATE Global Partner Event is Now Open!

By: Alex Passett    4/25/2024

Viasat's ELEVATE global partner event is right around the corner. From June 18-19 in Carlsbad, California, those interested in satIoT connectivity sol…

Read More

Assessing IoT Innovator LTIMindtree: Its 2023-24 Successes to Date and a Peek at What's Next

By: Alex Passett    4/24/2024

IoT Evolution World has presented a brief rundown of LTIMindtree's successes during FY24, as well as a peek at what's to come for the Internet of Thin…

Read More

Powering Adaptability in IoT: Telit Cinterion Reveals its First High-Precision GNSS Module

By: Alex Passett    4/22/2024

Telit Cinterion announced the launch of its SE868K5-RTK module, a high-precision Global Navigation Satellite System (GNSS) receiver capable of centime…

Read More

ICYMI: Your 'IoT TGIF' News Review

By: Alex Passett    4/19/2024

We've compiled several Internet of Things (IoT) stories that will benefit readers interested in global IoT market growth, Industrial Internet of Thing…

Read More