DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

Related

  • Top 7 Trends in IoT to Look Out for in 2021
  • 4 Best Practices for IoT OTA Updates
  • The 12 Biggest Android App Development Trends in 2023
  • Managed MQTT Broker Comparison — Console/Dashboard Features

Trending

  • Exploring Sorting Algorithms: A Comprehensive Guide
  • How To Deploy Helidon Application to Kubernetes With Kubernetes Maven Plugin
  • Unleashing the Power of Microservices With Spring Cloud
  • Creating a Deep vs. Shallow Copy of an Object in Java
  1. DZone
  2. Data Engineering
  3. Big Data
  4. IoT Botnets: Is Your Website at Risk?

IoT Botnets: Is Your Website at Risk?

Why is this important for organizations to understand in the context of securing their web applications?

Oliver Lavery user avatar by
Oliver Lavery
·
Sep. 08, 16 · Opinion
Like (2)
Save
Tweet
Share
4.58K Views

Join the DZone community and get the full member experience.

Join For Free

It’s no secret at this point that web applications represent a significant weak spot in organizations’ network security. As Verizon reports in its 2016 Data Breach Investigations Report, the single most significant cause of data breaches in corporate networks today is attacks on web apps. Complicating this problem is the fact that network boundaries are becoming increasingly blurred.

In the rush to develop Internet of Things (IoT) devices and software, security is often an afterthought. Princeton’s Center for Information Technology Policy notes that “more than 500,000 insecure, publicly accessible embedded networked devices” are connected to the Internet today, and that number is only expected to rise.

Why is this important for organizations to understand in the context of securing their web applications? Because as digital security expert Bruce Schneier maintains, as systems become more interconnected through the IoT, vulnerabilities in one system lead to attacks on others. IoT botnets which take aim at web and application servers are becoming an increasingly important threat vector.

‘Vulnerabilities on One System Cascade into Other Systems’

“Vulnerabilities on one system cascade into other systems, and the result is a vulnerability that no one saw coming and no one bears responsibility for fixing,” Schneier says in a recent blog post. “The Internet of Things will make exploitable vulnerabilities much more common. It's simple mathematics.”

“If 100 systems are all interacting with each other, that's about 5,000 interactions and 5,000 potential vulnerabilities resulting from those interactions. If 300 systems are all interacting with each other, that's 45,000 interactions. 1,000 systems: 12.5 million interactions. Most of them will be benign or uninteresting, but some of them will be very damaging,” according to Schneier.

So with IoT software applications being trusted to securely manage functions relating to home security, medical devices, transportation, and much more, organizations must develop strategies to defend against the IoT botnet risk.

Critical to these strategies is the understanding that the most effective security protections result from security controls built into applications themselves, rather than the perimeter protections organizations relied on in the past (such as Web Application Firewalls). The fundamental integrity of your organization’s web apps and websites is at stake.

As TechCrunch noted in a recent report on IoT botnets, attackers are expected to ramp up the pressure by developing increasingly sophisticated methods for targeting vulnerable IoT devices, using them to stage even larger-scale attacks. More advanced protections will be needed to guard against this threat, including solutions that allow for highly accurate analysis of incoming traffic to web apps.

Mitigate Web App Threats as they Happen With RASP

Runtime Application Self-Protection (RASP) solutions provide a better way to do exactly that, blocking attacks on web apps as they happen. RASP runs on a server, continuously analyzing the behavior of apps once they begin to run, and automatically mitigating threats. RASP solutions intercept calls from the app along with validating data requests inside the app to head off malicious behaviors.

To learn more about RASP and to better understand the advantages it offers over traditional web app security solutions like WAFs, read our white paper, “Real-Time Application Security.”

IoT Web application Botnet app IT

Published at DZone with permission of Oliver Lavery, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Top 7 Trends in IoT to Look Out for in 2021
  • 4 Best Practices for IoT OTA Updates
  • The 12 Biggest Android App Development Trends in 2023
  • Managed MQTT Broker Comparison — Console/Dashboard Features

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: