IoT devices using CoAP increasingly used in DDoS attacks

2-8-3

IoT devices in synchronised attacks on targets represent a growing part of global Distributed Denial of Service (DDoS) weapon arsenals. There is a significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks.

Click here to view original webpage at www.helpnetsecurity.com

Categories:

Your e-mail address will not be published.
Required fields are marked*