To solve a problem, the first thing is to clear the concept of the object, the universal definition of the Internet of things for the connection of objects. It consists of two meanings: one, the core and foundation of the Internet of Things is still the web, an extension and an extended network based on the internet, and secondly, its client extends and extends to any object and object, through the installation of sensors and cameras on objects for information exchange and communication, that is, material phase interest. According to the authoritative research institute predicts that by 2025, the world will have 100 billion connections, 6.5 billion Internet users use 8 billion smartphones, to 2020, the global Internet of things market will be more than $1 trillion, the internet of things become a huge tuyere.
650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/8B/7F/wKiom1hPpXrBt_JIAADbe7wWjiA757.jpg-wh_500x0-wm_3 -wmp_4-s_4135426291.jpg "title=" 111.jpg "alt=" Wkiom1hppxrbt_jiaadbe7wwjia757.jpg-wh_50 "/>
That huge market demand for the Internet of things to develop opportunities and development space, while some security issues surfaced, more and more physical devices connected to the Internet of things, coupled with the user's lack of security awareness, hackers can easily hijack physical devices into zombies, and manipulate these devices to launch a DDoS attack. So what do equipment manufacturers and IDC operators need to do to deal with such DDoS attacks?
First device manufacturers need to add secure program settings in the terminal, now hackers can easily hijack a large number of physical equipment, the main reason is that these smart devices are widely lack of necessary network security access control, like the smart home in the rice cooker, refrigerator, although can be remote intelligent control, But the control of this person is who, so the restrictions of the manufacturers have not taken into account.
Second, IDC operators need to be accurate and timely interception when hackers hijack IoT devices to launch DDoS attacks. And this relies on firewall technology, between the attacker's IP and the server to build a barrier, for the zombie service request, the firewall will use the relevant rules to identify, provide attack prevention, intranet security, traffic monitoring, mail filtering, web filtering, application layer filtering.
Finally, individuals should always pay attention to changing the factory default password.
The Internet of things is connected to inanimate objects and allows any device to join and connect all devices in any location, allowing them to display "life" signs, which businesses can use to gather more feedback. But if the security risks of "things" exist for a long time and cannot be solved. On the way to the "Internet of Everything", it seems to be heavy and far.
This article is from the "12379439" blog, please be sure to keep this source http://12389439.blog.51cto.com/12379439/1882303
How DDoS prevention protects IoT security