DDoS attacks and IoT devices
Tackling the DDoS attacks on or from IoT Devices

DDoS attacks and IoT devices

A distributed denial-of-service (DDoS) attack is a type of denial-of-service attack where the attack traffic is distributed across a network of computers or IoT devices. This makes it difficult to block or mitigate the attack, as it is coming from many different sources.

DDoS attacks can be used to target a variety of systems, including IoT devices, websites, servers, and networks. The goal of a DDoS attack is to overwhelm the target with traffic, forcing the devices to disconnect or the service to shut down.

How DDoS attacks work

DDoS attacks are typically carried out using a network of Internet connected computers or IoT devices that have been infected with malware. This network of computers or IoT devices, known as a botnet, can be used to send a large amount of traffic to the target system.

The attacker can control the botnet remotely and send instructions to the infected computers or IoT devices, telling them what traffic to send and to whom.

Impact of DDoS attacks on IoT devices

DDoS attacks expose IoT devices to cybersecurity threats in a number of ways:

  • DDoS attacks can overwhelm IoT devices with traffic, causing them to crash or become unresponsive. This can leave them vulnerable to other attacks, such as malware infections or data breaches.
  • DDoS attacks can be used to mask other attacks, such as man-in-the-middle attacks or data exfiltration. Attackers can use the flood of traffic generated by a DDoS attack to hide their malicious activity.
  • DDoS attacks can be used to disrupt critical infrastructure and services that rely on IoT devices. For example, a DDoS attack could target a power grid or a water treatment system, causing widespread outages and disruptions.

IoT devices are particularly vulnerable to DDoS attacks because they are often poorly secured and have a large attack surface. Attackers can exploit vulnerabilities in IoT devices to gain control of them and add them to their botnets, which are networks of compromised devices that can be used to launch DDoS attacks.

In addition, IoT devices are often connected to critical infrastructure and services, making them attractive targets for attackers. A successful DDoS attack against IoT devices could have a significant impact on society, disrupting essential services and causing economic damage.

Here are a few examples of DDoS attacks that have targeted IoT devices:

  • In 2016, the Mirai botnet launched a DDoS attack against the website of Dyn, a major DNS provider. The attack caused widespread outages of websites and online services, including Airbnb, Amazon, and Netflix. The Mirai botnet was made up of millions of compromised IoT devices, including webcams, routers, and DVRs.
  • In 2021, a DDoS attack targeted the water treatment system in Oldsmar, Florida. The attack caused an operator to accidentally increase the levels of sodium hydroxide in the water supply by 100 times. The attack was thwarted before any harm was done, but it demonstrated the potential for DDoS attacks to disrupt critical infrastructure.

One way that is often put forward to mitigate DDoS attacks is to use a VPN. While some VPN can hide IP Addresses to make it more difficult, they usually come at a cost as explained earlier and often nullified by providing a public IP addresses to the IoT device to establish the VPN.

In addition, once IoT devices are connected to a VPN, it is important to take steps to secure it. This includes using a firewall to restrict access to the VPN and configuring IoT devices to only accept traffic from known and trusted sources.


Now, another option is to connect IoT devices to private networks. Private networks are not accessible to the public internet, which makes them immune to DDoS attacks.


There are a number of ways to connect IoT devices to private networks. One option is to use a cellular network connected to a private network. There are a number of benefits to using IoT cellular connectivity with private network backhauling :

  • Security: IoT cellular connectivity to private networks can help to protect your IoT devices from DDoS attacks and unauthorised access and attacks.
  • Reliability: Cellular networks are generally reliable and offer good coverage, even in remote areas. This means that you can be confident that your IoT devices will be able to connect to your private network.
  • Scalability: Cellular networks can be scaled to support a large number of IoT devices. This makes them a good choice for businesses and organizations that have a large number of IoT devices to connect.
  • Reduced costs: Private networks can be more cost-effective than connecting IoT devices to the public internet or WiFi, especially for organisations with a large number of IoT devices.


If you are considering connecting your IoT devices to a private network, you should work with a networking specialist to develop a solution that meets your specific needs.

要查看或添加评论,请登录

Sylvestre Becker Babel的更多文章

社区洞察

其他会员也浏览了