Blog

IoT devices used in DDoS attacks

Share this post:

On Friday 21 October, unknown hackers used Internet of Things (IoT) devices to launch three Distributed Denial of Service, or DDoS attacks on Dyn. Dyn is a company that provides internet services, among them a Domain Name Service (DNS). A DNS services is like a telephone directory for the internet, it translates the web address that you search for, such as www.ibm.com into the IP address used by the internet – for IBM that’s 9.87.12.1. Using the telephone directory example, without the DNS, it’s impossible to find the number for the person you want to contact. The press was quick to report the attack calling out the exploitation of IoT devices, such as the NY Times and the BBC News.

A DDoS attack uses multiple computers and Internet connections to flood a targeted resource, making it very difficult and sometimes impossible for the target to operate. Dyn estimates that 10’s of millions of IP addresses were involved. The attackers impacted many well-known websites using an unknown number of IP addresses that belonged to IoT devices. The IoT devices were thought to be low-end, inexpensive devices with user names and/or passwords that were easy to guess but couldn’t be changed by the user, making them highly vulnerable to attack.

In the remainder of this blog post I’ll underline the importance of security for IoT.  I’ll also outline how IBM can help IoT device manufacturers and those enterprises deploying IoT solutions, to increase their IoT Security.

How important is security for IoT?

Security is a significant topic of debate around the IoT, with concerns that it opens new avenues of attack by extending the scope of information technology to everyday connected devices and things. IBM believes that security is fundamental to how the IoT must operate to the extent that IBM have recently published a new whitepaper providing IBM’s point of view on IoT Security.

While unable to comment on individual cases, the DDoS attacks on Dyn highlights the need for everyone involved with IoT to consider security by design. Security for IoT should be built into IoT devices and software, from manufacturers to end-users. There is no doubt that IoT significantly expands the attack surface for enterprises and the scope of enterprise IT. Just as enterprises are used to addressing security in their IT infrastructure they must do the same for IoT solutions and products.

The recent attacks and vulnerabilities also underline the importance of being able to view, manage and update IoT devices and firmware after the point of manufacture.  The Watson IoT Platform has functionality to update firmware on IoT devices. Following Friday’s attacks, IBM has mobilized teams around the world to support clients wanting help to secure their IoT solutions, helping through technology, the IBM Watson IoT Platform, and our IoT security expertise.

How can I increase the security of my IoT landscape?

IBM has both breadth and depth of solutions and services to help clients secure their IoT landscape. The Watson IoT Platform has an important role to play in IoT security. IBM has always taken this very seriously and earlier this month announced new security offerings and capabilities around IoT and the Watson IoT Platform. IoT security will be a big topic at World of Watson in Las Vegas this week and we are bringing to market three new offerings to assist clients:

  1. IoT Security Assessment services offering – IBM IoT and Security experts visit clients and advise on the end-to-end security of  IoT solutions for clients and make recommendations.
  2. IoT Security Intelligence services offering – this enables enterprises to understand IoT security events in real-time. These use behavior-based solutions which detect deviations from normal behavior patterns and recognize new attacks or security issues
  3. Advanced Security capabilities in the Watson IoT platform – a security dashboard, giving operators visibility to potential vulnerabilities and exposures across the network; an alert system for immediate notification, enabling enterprises to respond IoT Security events by understanding them in real-time; a visual policy management for enterprises’ IoT landscapes, allowing automatic identification of security events in accordance with best-practice policies tailored to your IoT environment; the ability to integrate Watson IoT Platform with Blockchain for trusted IoT transactions among a group of parties, improving business efficiency and security.

For more information about security and the Watson IoT Platform, please contact wiotmktg@us.ibm.com.

More Asset Management stories

Extract every bit of value from your physical assets with maintenance delivered by the Technician of the Future

Written by Bruce D Baron | February 10, 2020 | Asset Management, Safety, Worker Insights

When you attend the Maximo Academy at IoT Exchange, you’ll experience firsthand how IBM Maximo — the global leader in enterprise asset management — is tackling these monumental changes for employees and their organizations. See how artificial intelligence (AI) and predictive analytics are used to allow technicians to perform maintenance only when and where it’s needed. ...read more


Increase your business success with a personalized digital reinvention journey

Written by Andrea Martin | January 23, 2020 | Aerospace, Asset Management, Automotive...

Our experts at the IBM Watson IoT Center understand this challenge. So they’ve developed a special opportunity for those who want to understand digital innovation. They’ve created a customizable, intensive journeys that inspires visionary thinkers to plan and then launch a better future for their organizations. This personalized immersion journey is now available to you at the IBM Watson IoT Center in Munich. ...read more


Adoption of BIM and Maximo: Bridging the asset data gap between build and operate

Written by Scott Yates | January 21, 2020 | Asset Management, Buildings, Construction...

One Midwest-based airport was in the unique position of staring down an almost complete renewal of their entire site, including terminals, parking lots and support buildings. That prospect, coupled with the known gap I’ve just mentioned, would be enough to keep any Facilities Director up at night. ...read more