Work place: School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India
E-mail:
Website:
Research Interests: Computational Science and Engineering
Biography
Sagar Agarwal is an internal IT engineer, system engineer, BAU activities coordination, participated in various network shutdown activities, trained students how to be aware of online cybercrime. He is working in Graphic Era Hill University, Dehradun, India.
By Atika Bansal Divya Kapil Anupriya Sagar Agarwal Vishan Kumar Gupta
DOI: https://doi.org/10.5815/ijwmt.2022.03.02, Pub. Date: 8 Jun. 2022
Internet of Things is used for those devices, which are connected over a network, once the devices are connected to the internet they are known as smart devices. These devices share information and communicate with each other to influence our day to day lives. Due to the rise in these devices, security is compromised. Malware is malicious software that can damage the computer, server, or network intentionally. Malware can also exploit the confidentiality, integrity, availability (CIA) triad. Rather than the traditional malware, IoT malware can damage different internet connected devices such as routers, DVRs, CCTV, or many internets connected devices. The IoT devices are more vulnerable due to weak passwords, missing authentication schemes, backdoor entries, lack of high-security algorithms, and plug and play services. There is no widespread survey available about IoT malware in an efficiently organized manner, publicly. In this article, we have classified the IoT malware according to their release and provide on the basis of their functionalities, growth, revolution, and their detection mechanism. We perform DDoS attack on Raspberry PI to hamper the home automation system. We employ Wireshark to monitor network traffic and demonstrate the service unavailability.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals