Securing IoT Devices Against Exploitation for Cyber Attacks through Detection and Mitigation Strategies Case Study of Public Institutions in Rwanda
Securing IoT Devices Against Exploitation for Cyber Attacks through Detection and Mitigation Strategies Case Study of Public Institutions in Rwanda
Abstract: The increasing proliferation of Internet of Things (IoT) devices has led to significant security concerns, primarily
due to their simple internal structures and energy-efficient designs, which prioritize compactness. With billions of IoT devices
currently in use worldwide, their sheer volume presents a substantial risk. These devices often come with hardware and
software limitations, as they are designed for convenience, mass production, and cost-effectiveness, with security typically
being a secondary consideration. The rapid expansion of IoT devices makes it increasingly challenging to monitor and address
their vulnerabilities. This paper explores the prevalent security risks, attacks, and inherent weaknesses of IoT devices, along
with the challenges of protecting them against emerging cyber threats. Since IoT devices frequently serve as entry points to
other interconnected systems and are prone to exploitation for botnet formation or man-in-the-middle attacks, they are
attractive targets for cybercriminals. The paper also outlines various methods of remediation and mitigation, such as
implementing robust access control systems, adopting secure communication protocols, and ensuring timely updates and
patches. By gaining a deeper understanding of the security challenges facing IoT devices and applying effective mitigation
strategies, individuals and organizations can better protect their connected devices and networks, ensuring their safety,
privacy, and security.
Keywords: Internet of Things (IoT), Botnets, Distributed Denial of Service (DDoS), Threat Mitigation, Detection Methods.
How to Cite: Hakizimana Jean d’Amour; Dr. Wilson Musoni (PhD); (2025). Securing Iot Devices Against Exploitation for Cyber
Attacks Through Detection and Mitigation Strategies Case Study of Public Institutions in Rwanda. International Journal of Innovative
Science and Research Technology, 10(3),1749-1762. https://doi.org/10.38124/ijisrt/25mar1471
I. INTRODUCTION true scale and severity of the issue are often underestimated.
Many users fail to fully grasp the potential risks posed by
The advent of the Internet of Things (IoT) has botnets. The infamous NetBus and BackOrifice2000
significantly enhanced productivity and convenience by programs, introduced in 1998, were among the first Trojan
enabling devices to interconnect and communicate in horse programs to allow remote access and control of infected
innovative ways. However, the rapid development of IoT computers. These programs marked a significant evolution in
technology has also introduced substantial security concerns. cybercrime, enabling attackers to perform various operations
Many IoT devices lack robust security measures, making them such as opening and closing CD-ROM drives, taking
vulnerable to hacking. One major threat stemming from the screenshots, and executing commands remotely on infected
insecurity of these devices is their potential use in creating systems.
botnets, which can be leveraged to execute Distributed Denial
of Service (DDoS) attacks. How a Botnet Functions: Most botnets are designed as
distributed systems, where a central botnet operator
This study aims to investigate how attackers exploit (botmaster) gives commands to a few compromised machines,
insecure IoT devices to form botnets, the specific techniques which in turn relay those instructions to other infected devices,
they use for these attacks, and the challenges in detecting and often through Internet Relay Chat (IRC). A typical botnet
mitigating such threats. By evaluating current security consists of a server program, a client program for executing
solutions and suggesting new approaches, the study seeks to commands, and a bot program that embeds itself in the victim's
enhance defense strategies against this growing cyber risk. system. These components communicate with one another
over a network and may employ encryption to avoid detection
Botnets have been a threat for over a decade, and while and protect against intrusion into the botnet’s control
cybersecurity experts have warned about their dangers, the infrastructure.
The Mirai botnet, which primarily consisted of IoT and analysis sheds light on the fragile and insecure nature of the
embedded devices, made headlines in late 2016 when it IoT ecosystem. We argue that Mirai could represent a
launched massive Distributed Denial of Service (DDoS) significant turning point in the development of botnets.
attacks that targeted several prominent organizations. In this
study, we provide a retrospective analysis of the Mirai botnet's The simplicity with which devices were compromised
rapid growth, which peaked at 600,000 infected devices, and and the botnetrapid expansion highlight how even rudimentary
examine its history of DDoS targets. By incorporating diverse attack methods can exploit large numbers of low-end devices,
measurement techniques, we explore how the botnet emerged, posing a serious threat even to well-secured targets. To
which types of devices wereimpacted, and how various Mirai mitigate this growing
variants evolved and competed for vulnerable hosts. Our
Fig 3 DDoS
A critical component of any botnet is its communication However, P2P botnets face challenges, particularly
infrastructure. Traditionally, botnets used Internet Relay Chat related to higher latency in command and control
(IRC) for communication. After infection, the bot connects to communication, which can impact synchronization across the
an IRC server, and the botmaster issues commands over IRC botnet.
In today’s increasingly connected environment, the rapid reliable but also relevant and applicable to Rwanda’s evolving
growth of Internet of Things (IoT) devices offers both digital environment, thus enhancing the resilience of public
advantages and vulnerabilities, especially for public institutions against cyber threat.
institutions. This chapter explores methods to mitigate the
exploitation of insecure IoT devices by attackers who use them A. Research Design
to build botnets for Distributed Denial of Service (DDoS) This study follows a descriptive and exploratory survey
attacks. It also examines detection and mitigation strategies design. The descriptive part helps identify how attackers
essential for public institutions in Rwanda, which are exploit insecure IoT devices to form botnets for DDoS attacks
becoming more reliant on digital platforms for governance and on public institutions in Rwanda. The exploratory component
service delivery. The research methodology involves focuses on uncovering the specifics of how these attacks occur
examining the security weaknesses in IoT devices, coupled and developing strategies to detect and counteract them. The
with data collection and analysis to identify common attack study gathers insights from key individuals, such as IT staff,
vectors. This approach ensures a thorough understanding of cybersecurity professionals, and government officials, using
the impact insecure IoT devices can have on public both qualitative and quantitative methods. This approach
infrastructure and provides actionable strategies to prevent ensures a comprehensive understanding of IoT security issues
these threats. The goal is to propose solutions that are not only and offers potential solutions for public institutions.
D. Data Collection Methods and Instruments/Tools IV. DATA ANALYSIS, PRESENTATION, AND
Data will be collected using a combination of surveys, INTERPRETATION
interviews, and observations. Surveys will be distributed to
managers, employees, and farmers to gather quantitative data This chapter presents the findings of a study aimed at
on system effectiveness and user satisfaction. These surveys safeguarding IoT devices from exploitation that could result in
will include both structured questions with Likert scales and DDoS attacks orchestrated by botnets. The analysis is centered
open-ended sections for qualitative feedback. Interviews will around the research objectives, which involve identifying
be conducted with selected managers and farmers to obtain vulnerabilities in IoT devices, exploring attack mechanisms,
deeper insights into their experiences with the system. A semi- and proposing improved detection methods. The results were
structured interview guide will be used to facilitate these derived from data collected from IT professionals working in
discussions. Additionally, observations will be made to public institutions in Rwanda. Both qualitative and
evaluate the system’s practical implementation and usability, quantitative approaches were used, with statistical tools such
particularly in the milk collection process, which will be as Python for data analysis and expert insights contributing to
documented and assessed using checklists. the findings.
F. Data Analysis
The data will be analyzed using both qualitative and
quantitative methods. Descriptive statistics will summarize
key metrics, such as means, frequencies, and percentages, for
the quantitative data. Inferential statistics will be used to test
hypotheses and identify patterns or relationships. For
qualitative data, thematic and content analysis will be
employed. Content analysis will focus on extracting
meaningful insights from responses, while thematic analysis
will identify and explore patterns and themes in observational
and interview data. This dual approach will offer a thorough
understanding of the system’s effectiveness and impact.
The results reveal that 80% of respondents are aware of the threats posed by IoT device exploitation for botnet-driven DDoS
attacks. This highlights the increasing recognition of IoT security risks and the need for effective mitigation strategies, particularly in
governmental institutions in Rwanda.
The data indicates that the adoption of IoT security difficulties in fully implementing these solutions, likely due to
strategies is still in the early stages within government constraints in resources, technical skills, or scalability issues.
institutions.
Not Implemented (37.5%): Almost 40% of institutions
Adoption Status Insights: (37.5%) have not adopted any detection or mitigation
Fully Implemented (20%): A small proportion (20%) of measures for IoT devices. This reflects significant obstacles to
institutions have fully adopted IoT security measures designed implementation, which could stem from a lack of awareness
to detect and mitigate botnet-driven DDoS attacks. This regarding IoT-specific risks, limited funding, and challenges
highlights significant gaps in the widespread adoption of in regulatory compliance.
robust IoT security solutions, which may be attributed to
budget limitations, lack of specialized expertise, and Detection Methods for Compromised IoT Devices
inadequate infrastructure. Effectiveness of Detection Methods in Identifying Botnet-
Compromised IoT Devices Respondents were asked to
Partially Implemented (42.5%): Over 40% (42.5%) of evaluate the effectiveness of various detection methods for
institutions have made progress in adopting partial IoT identifying IoT devices that may have been compromised and
security solutions. These institutions appear to acknowledge are part of a botnet used for DDoS attacks. Below are the
the rising threat posed by botnet exploitation but face
findings:
The data reveals that 60.0% of respondents view methods aimed at securing IoT devices from botnet
detection methods for compromised IoT devices as highly exploitation. It also emphasizes the challenges and gaps in the
effective, while an additional 33% consider them to be implementation of these measures, aligning with the broader
somewhat effective. This suggests a general confidence in the objective of safeguarding IoT systems.
effectiveness of existing detection techniques, but it also
underscores the need for further improvements to ensure D. Common Vulnerabilities in IoT Devices
comprehensive protection against botnet-driven DDoS The study highlights several vulnerabilities within IoT
attacks. devices that make them prone to exploitation for botnet-driven
DDoS attacks. Notable vulnerabilities include:
This section clearly outlines the current level of
awareness, adoption, and perceived effectiveness of detection
Command and Control (C&C) Communication Anomaly-Based Intrusion Detection Systems (IDS):
Infected devices connect with a C&C server controlled These systems monitor network traffic for abnormal
by the attacker. Encrypted communication channels and patterns indicative of botnet activity. Notably, 78% of security
domain generation algorithms (DGA) are often used to engineers highlighted the importance of real-time anomaly
maintain control. detection
V. CONCLUSIONS RECOMMENDATIONS
The study concludes that while there is an increasing Application to Organizations and Government
awareness of IoT security risks among organizations in Institutions
Rwanda, the actual implementation of robust security
measures remains insufficient. Common weaknesses such as Capacity Building Programs:
poor authentication, outdated software, and the lack of real- Organizations should create ongoing training initiatives
time monitoring expose IoT devices to DDoS attacks. to enhance the skills of IT personnel in IoT security.
Moreover, the limited number of trained cybersecurity experts Partnerships with academic institutions and the private sector
and the high costs of security solutions further hinder effective can support the creation of specialized certification programs
mitigation efforts. To address these issues, a comprehensive focused on IoT threat management.
approach is needed, incorporating advanced detection
systems, capacity-building initiatives, and stronger regulatory
measures to safeguard IoT environments from exploitation.