Sify-Banner1
Puneet Bhasin
International Cyber Law Expert, President
Cyberjure Legal Consulting

Cyber Crime in Internet of Things

Internet of Things (IoT) has taken the world by storm and we want smart televisions, connected devices, and technology at our fingertips, but without proper cyber security we are opening a pandora’s box of troubles with this.

Recently, there were cases of smart televisions being used to spy on the users. CCTV cameras have been attacked and used to spy on the users. This gives rise to very frightening questions such as:

Are you watching TV or is your TV watching you?

Are you monitoring using CCTV cameras or are the CCTV cameras monitoring you?

The explosion of connectivity under IoT is currently spreading across the globe giving rise to various new IP addresses via IPv6 enabling new innovations. However, this growth of internet has created a new way for the cyber criminals and hackers, as rightly said by Maneesha Mithal, Federal Commission Associate Director for Privacy and Identity Protection ubiquitous data creates risk for the consumers while the voluminous data proves an advantage for the hackers. There are a number of cybercrimes occurring on a daily basis in the field of IoT; among the various reasons one of the main reason for increase in cybercrime in this field is lack of security and privacy measures as well as lack of awareness among consumers to protect their devices from the threats and ambiguities related to IoT.

Types of Attacks on IoT Devices:

UDP flood. As the name itself suggests, under this type of DDos attack the user datagram protocol (UDP) packet is attacked. The main aim of this attack is to flood random ports on remote hosts causing the host to constantly check the application listening at that port, and on finding no application reply with IPCM destination unreachable packet undermining the host resources leading to the inaccessibility of the website. UDP flooding on one host leads to poor performance of the host while an attack on two hosts leads to extreme network congestion again affecting its performance. This attack can however not enable the party any additional access. Any person connected to the internet can cause denial of services.

ICMP (ping) flood. Based on the same principle as the UDP flood is the ICMP flood. The main aim of this attack is sending maximum ICMP echo request (ping) packets as fast as possible which slows down the system resulting in consumption of both incoming and outgoing bandwidth.

SYN flood. In this type of attack the SYN requests TCP connection with the host which must be answered only by SYN–ACK from the other party and then confirms from the ACK requester and as a result the requester sends multiple requests. The main problem arises when the server system has sent acknowledgement SYN–ACK and the client has not yet received the ACK message and in this way the victim party faces difficulty in accepting any new incoming network connection request. Such attacks may exhaust the system’s memory, crash, or make it inoperative.

Ping of death. In this type of attack, the attacker send multiple malicious pings to the other party. The attackers create IP packets exceeding the maximum packet size and when these large packets attack the system it crashes the system making it more vulnerable.

Slowloris. Slowloris is an attack which enables one web server to take down another without affecting services or ports of targeted networks. By holding many servers to target the web server for as long as possible which is obtained by creating connections to target servers by sending partial requests. It sends HTTP headers but no complete request. As a result of this there is overflow of a concurrent connection pool leading to denial of services from clients.

Share this:
Stay Updated on Enterprise Network and Carriers Industry.
Receive our Daily Newsletter.