What is it about?

In the first part, we have seen how perpetrators not only infect IoT devices but also creates a botnet through compromised IoT nodes. In the last part, our model shows how this army of compromised IoT devices can attack a critical network.

Featured Image

Why is it important?

In 2016, three major DDoS attacks was done by Mirai botnet. This paper is based on these attacks.

Read the Original

This page is a summary of: Mathematical model on distributed denial of service attack through Internet of things in a network, Nonlinear Engineering, January 2019, De Gruyter,
DOI: 10.1515/nleng-2017-0094.
You can read the full text:

Read

Contributors

The following have contributed to this page