
AI and IoT: Accelerating the Power of DDoS Attacks
International Workshop on Understanding and Defending Against AI-Augmented IoT Threats
Virtual / Online
Mentor Based
Moderate
3 Days
10 -June -2025
7 PM IST
About
AI and IoT: Accelerating the Power of DDoS Attacks is an advanced-level international workshop designed to uncover the growing intersection between AI, IoT proliferation, and cyber warfare tactics. While IoT enables real-time connectivity and data-driven automation, it also exposes critical vulnerabilities that cyber attackers now amplify using AI.
Participants will dive deep into DDoS attack vectors, AI-based botnet orchestration, anomaly detection, network traffic modeling, and real-time mitigation frameworks. Using tools like Wireshark, Scapy, TensorFlow, Snort, and Keras, attendees will gain hands-on experience in both attack simulation and intelligent defense implementation.
Aim
To explore how Artificial Intelligence (AI) and Internet of Things (IoT) technologies are being exploited to scale and automate Distributed Denial-of-Service (DDoS) attacks, and to train participants in identifying, simulating, and mitigating such cyber threats using advanced defense strategies.
Workshop Objectives
-
Reveal the dual-use potential of AI in cybersecurity—both attacker and defender roles
-
Train participants to implement robust, AI-based defense architectures
-
Encourage ethical use of penetration testing tools in research and training
-
Prepare professionals to defend next-gen smart ecosystems from intelligent threats
Workshop Structure
🔹 Day 1: The Evolving Cyber Threat Surface – DDoS in the Age of AI & IoT
-
Understanding the Modern IoT Threat Landscape
-
Device sprawl, vulnerabilities, and real-world incidents
-
-
Anatomy of DDoS Attacks in IoT Ecosystems
-
Volumetric, protocol exploitation, and application layer attacks
-
-
AI as a Force Multiplier for DDoS Campaigns
-
Target automation, dynamic payload generation, and swarm intelligence
-
-
Global Case Studies & Cyber Intelligence
-
Mirai Botnet 2.0, Mozi, Dark Nexus
-
Interactive Demonstration
-
Simulated DDoS traffic using open-source toolkits (e.g., LOIC, Hping3)
-
Real-time packet analysis with Zeek and Wireshark
🔹 Day 2: Offensive Artificial Intelligence – Automating, Evolving, Attacking
-
Adversarial Machine Learning in DDoS Attacks
-
ML-based target profiling and attack path optimization
-
-
Deep Reinforcement Learning for Dynamic Attack Strategies
-
AI bots adapting in real-time to evade detection and maximize impact
-
-
Bypassing AI Defenses: Adversarial Evasion & Model Poisoning
-
Techniques for manipulating and defeating ML-based IDS systems
-
-
Emerging Threat Vectors
-
AI-generated network traffic mimicking normal behavior
-
Practical Exercise
-
Build and test a simple anomaly detection model using Python (e.g., Random Forest or SVM)
-
Generate adversarial inputs using FGSM or textGAN
🔹 Day 3: Designing AI-Resilient IoT Architectures – From Detection to Defense
-
AI-Augmented Intrusion Detection & Prevention Systems (IDPS)
-
Supervised and unsupervised models for real-time traffic scoring
-
-
Federated Learning for Edge-Based Defense
-
Privacy-aware distributed models for smart devices
-
-
Security Orchestration, Automation, and Response (SOAR)
-
AI integration in automated mitigation pipelines
-
-
Governance, Risk, and Compliance (GRC)
-
Alignment with ISO/IEC 27001, NIST RMF, OWASP IoT Top 10, and GDPR
-
Capstone Design Project
-
Group design of a secure IoT network architecture
-
Threat modeling using STRIDE and MITRE ATT&CK for IoT
Intended For
-
Cybersecurity professionals and network engineers
-
AI/ML practitioners working on threat detection
-
IoT product developers and embedded systems engineers
-
Researchers in cyber warfare, data forensics, and smart systems
-
Students with basic knowledge of networking and Python
Important Dates
Registration Ends
2025-06-10
Indian Standard Timing 4 PM
Workshop Dates
2025-06-10 to 2025-06-12
Indian Standard Timing 7 PM
Workshop Outcomes
-
Understand how AI is used offensively in modern DDoS attack strategies
-
Learn to simulate and detect malicious traffic patterns using ML models
-
Design AI-enhanced security layers for vulnerable IoT networks
-
Analyze large-scale network data for real-time anomaly identification
-
Receive global certification in AI-driven cybersecurity strategies
Mentor Profile
Fee Structure
List of Currencies
FOR QUERIES, FEEDBACK OR ASSISTANCE
Key Takeaways
- Access to Live Lectures
- Access to Recorded Sessions
- e-Certificate
- Query Solving Post Workshop
Future Career Prospects
Participants will gain skills for roles such as:
-
AI Cybersecurity Specialist
-
IoT Security Engineer
-
Network Defense Analyst
-
Threat Intelligence Researcher
-
Red Team/Penetration Tester (AI/IoT Focus)
Job Opportunities
-
Cybersecurity firms and SOCs (Security Operation Centers)
-
Government agencies in digital defense and homeland security
-
Smart city and industrial IoT infrastructure teams
-
Cloud and edge computing companies
-
R&D labs working on AI for cyber-physical systems
Enter the Hall of Fame!
Take your research to the next level!
Achieve excellence and solidify your reputation among the elite!
Related Courses
Advanced MLOps: ModelOps, …
AI Automation for DevOps Teams
AI Ethics, Legal …
AI for Clean Energy, Utilities …
Recent Feedbacks In Other Workshops
Menthor was easy to follow