Home > Courses > AI and IoT: Accelerating the Power of DDoS Attacks
Table of Contents
    Workshop Registration End Date :2025-06-10

    Mentor Based

    AI and IoT: Accelerating the Power of DDoS Attacks

    International Workshop on Understanding and Defending Against AI-Augmented IoT Threats

    MODE
    Virtual / Online
    TYPE
    Mentor Based
    LEVEL
    Moderate
    DURATION
    3 Days
    START DATE
    10 -June -2025
    TIME
    7 PM IST

    About

    AI and IoT: Accelerating the Power of DDoS Attacks is an advanced-level international workshop designed to uncover the growing intersection between AI, IoT proliferation, and cyber warfare tactics. While IoT enables real-time connectivity and data-driven automation, it also exposes critical vulnerabilities that cyber attackers now amplify using AI.

    Participants will dive deep into DDoS attack vectors, AI-based botnet orchestration, anomaly detection, network traffic modeling, and real-time mitigation frameworks. Using tools like Wireshark, Scapy, TensorFlow, Snort, and Keras, attendees will gain hands-on experience in both attack simulation and intelligent defense implementation.

    Aim

    To explore how Artificial Intelligence (AI) and Internet of Things (IoT) technologies are being exploited to scale and automate Distributed Denial-of-Service (DDoS) attacks, and to train participants in identifying, simulating, and mitigating such cyber threats using advanced defense strategies.

    [if 7586 not_equal=””][/if 7856]

    Workshop Objectives

    • Reveal the dual-use potential of AI in cybersecurity—both attacker and defender roles

    • Train participants to implement robust, AI-based defense architectures

    • Encourage ethical use of penetration testing tools in research and training

    • Prepare professionals to defend next-gen smart ecosystems from intelligent threats

    Workshop Structure

    🔹 Day 1: The Evolving Cyber Threat Surface – DDoS in the Age of AI & IoT

    • Understanding the Modern IoT Threat Landscape

      • Device sprawl, vulnerabilities, and real-world incidents

    • Anatomy of DDoS Attacks in IoT Ecosystems

      • Volumetric, protocol exploitation, and application layer attacks

    • AI as a Force Multiplier for DDoS Campaigns

      • Target automation, dynamic payload generation, and swarm intelligence

    • Global Case Studies & Cyber Intelligence

      • Mirai Botnet 2.0, Mozi, Dark Nexus

    Interactive Demonstration

    • Simulated DDoS traffic using open-source toolkits (e.g., LOIC, Hping3)

    • Real-time packet analysis with Zeek and Wireshark


    🔹 Day 2: Offensive Artificial Intelligence – Automating, Evolving, Attacking

    • Adversarial Machine Learning in DDoS Attacks

      • ML-based target profiling and attack path optimization

    • Deep Reinforcement Learning for Dynamic Attack Strategies

      • AI bots adapting in real-time to evade detection and maximize impact

    • Bypassing AI Defenses: Adversarial Evasion & Model Poisoning

      • Techniques for manipulating and defeating ML-based IDS systems

    • Emerging Threat Vectors

      • AI-generated network traffic mimicking normal behavior

    Practical Exercise

    • Build and test a simple anomaly detection model using Python (e.g., Random Forest or SVM)

    • Generate adversarial inputs using FGSM or textGAN


    🔹 Day 3: Designing AI-Resilient IoT Architectures – From Detection to Defense

    • AI-Augmented Intrusion Detection & Prevention Systems (IDPS)

      • Supervised and unsupervised models for real-time traffic scoring

    • Federated Learning for Edge-Based Defense

      • Privacy-aware distributed models for smart devices

    • Security Orchestration, Automation, and Response (SOAR)

      • AI integration in automated mitigation pipelines

    • Governance, Risk, and Compliance (GRC)

      • Alignment with ISO/IEC 27001, NIST RMF, OWASP IoT Top 10, and GDPR

    Capstone Design Project

    • Group design of a secure IoT network architecture

    • Threat modeling using STRIDE and MITRE ATT&CK for IoT

    Intended For

    • Cybersecurity professionals and network engineers

    • AI/ML practitioners working on threat detection

    • IoT product developers and embedded systems engineers

    • Researchers in cyber warfare, data forensics, and smart systems

    • Students with basic knowledge of networking and Python

    Important Dates

    Registration Ends

    2025-06-10
    Indian Standard Timing 4 PM

    Workshop Dates

    2025-06-10 to 2025-06-12
    Indian Standard Timing 7 PM

    Workshop Outcomes

    • Understand how AI is used offensively in modern DDoS attack strategies

    • Learn to simulate and detect malicious traffic patterns using ML models

    • Design AI-enhanced security layers for vulnerable IoT networks

    • Analyze large-scale network data for real-time anomaly identification

    • Receive global certification in AI-driven cybersecurity strategies

    Mentor Profile

    WhatsApp Image 2025 02 05 at 12.27.58 PM scaled

    J. T. Sibychen

    Cyber and Cloud Security Trainer

    NIIT Foundation

    more

    Fee Structure

    Student Fee

    INR. 1999
    USD. 50

    Ph.D. Scholar / Researcher Fee

    INR. 2999
    USD. 60

    Academician / Faculty Fee

    INR. 3999
    USD. 70

    Industry Professional Fee

    INR. 5999
    USD. 90

    We are excited to announce that we now accept payments in over 20 global currencies, in addition to USD. Check out our list to see if your preferred currency is supported. Enjoy the convenience and flexibility of paying in your local currency!
    List of Currencies

    FOR QUERIES, FEEDBACK OR ASSISTANCE

    Key Takeaways

    • Access to Live Lectures
    • Access to Recorded Sessions
    • e-Certificate
    • Query Solving Post Workshop
    wsCertificate

    Future Career Prospects

    Participants will gain skills for roles such as:

    • AI Cybersecurity Specialist

    • IoT Security Engineer

    • Network Defense Analyst

    • Threat Intelligence Researcher

    • Red Team/Penetration Tester (AI/IoT Focus)

    Job Opportunities

    • Cybersecurity firms and SOCs (Security Operation Centers)

    • Government agencies in digital defense and homeland security

    • Smart city and industrial IoT infrastructure teams

    • Cloud and edge computing companies

    • R&D labs working on AI for cyber-physical systems

    Enter the Hall of Fame!

    Take your research to the next level!

    Publication Opportunity
    Potentially earn a place in our coveted Hall of Fame.

    Centre of Excellence
    Join the esteemed Centre of Excellence.

    Networking and Learning
    Network with industry leaders, access ongoing learning opportunities.

    Hall of Fame
    Get your groundbreaking work considered for publication in a prestigious Open Access Journal (worth ₹20,000/USD 1,000).

    Achieve excellence and solidify your reputation among the elite!


    ×

    Related Courses

    program_img

    AI Automation for DevOps Teams

    Recent Feedbacks In Other Workshops

    AI for Environmental Monitoring and Sustainablility

    Menthor was easy to follow


    IVANA PILJEK MILETIĆ : 2025-05-27 at 5:38 pm

    Build Intelligent AI Apps with Retrieval-Augmented Generation (RAG)

    Please organise and execute better and maintain a professional setting with no disturbance and More stable wifi.
    Astha Anand : 2025-05-27 at 3:32 pm

    🌱 AI-Powered Life Cycle Assessment Dashboards

    Thanks for the points raised, the only suggestion is to involve more interactive parts into the More course.
    Javad : 2025-05-27 at 1:59 pm

    View All Feedbacks

    Stay Updated


    Join our mailing list for exclusive offers and course announcements

    Ai Subscriber