May 4, 2023, 1:10 a.m. | Angelo Feraudo, Diana Andreea Popescu, Poonam Yadav, Richard Mortier, Paolo Bellavista

cs.CR updates on arXiv.org arxiv.org

As the prevalence of Internet-of-Things (IoT) devices becomes more and more
dominant, so too do the associated management and security challenges. One such
challenge is the exploitation of vulnerable devices for recruitment into
botnets, which can be used to carry out Distributed Denial-of-Service (DDoS)
attacks. The recent Manufacturer Usage Description (MUD) standard has been
proposed as a way to mitigate this problem, by allowing manufacturers to define
communication patterns that are permitted for their IoT devices, with
enforcement at the …

attacks botnet botnets challenge challenges ddos ddos attacks devices distributed ebpf exploitation internet iot iot botnet management recruitment security security challenges service things traffic vulnerable

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Product Delivery Associate - Cybersecurity | CyberOps

@ JPMorgan Chase & Co. | NY, United States

Security Ops Infrastructure Engineer (Remote US):

@ RingCentral | Remote, USA

SOC Analyst-1

@ NTT DATA | Bengaluru, India