
AI and IoT: Accelerating the Power of DDoS Attacks
International Workshop on Understanding and Defending Against AI-Augmented IoT Threats
Skills you will gain:
About Program:
AI and IoT: Accelerating the Power of DDoS Attacks is an advanced-level international workshop designed to uncover the growing intersection between AI, IoT proliferation, and cyber warfare tactics. While IoT enables real-time connectivity and data-driven automation, it also exposes critical vulnerabilities that cyber attackers now amplify using AI.
Participants will dive deep into DDoS attack vectors, AI-based botnet orchestration, anomaly detection, network traffic modeling, and real-time mitigation frameworks. Using tools like Wireshark, Scapy, TensorFlow, Snort, and Keras, attendees will gain hands-on experience in both attack simulation and intelligent defense implementation.
Aim:
To explore how Artificial Intelligence (AI) and Internet of Things (IoT) technologies are being exploited to scale and automate Distributed Denial-of-Service (DDoS) attacks, and to train participants in identifying, simulating, and mitigating such cyber threats using advanced defense strategies.
Program Objectives:
-
Reveal the dual-use potential of AI in cybersecurity—both attacker and defender roles
-
Train participants to implement robust, AI-based defense architectures
-
Encourage ethical use of penetration testing tools in research and training
-
Prepare professionals to defend next-gen smart ecosystems from intelligent threats
What you will learn?
🔹 Day 1: The Evolving Cyber Threat Surface – DDoS in the Age of AI & IoT
-
Understanding the Modern IoT Threat Landscape
-
Device sprawl, vulnerabilities, and real-world incidents
-
-
Anatomy of DDoS Attacks in IoT Ecosystems
-
Volumetric, protocol exploitation, and application layer attacks
-
-
AI as a Force Multiplier for DDoS Campaigns
-
Target automation, dynamic payload generation, and swarm intelligence
-
-
Global Case Studies & Cyber Intelligence
-
Mirai Botnet 2.0, Mozi, Dark Nexus
-
Interactive Demonstration
-
Simulated DDoS traffic using open-source toolkits (e.g., LOIC, Hping3)
-
Real-time packet analysis with Zeek and Wireshark
🔹 Day 2: Offensive Artificial Intelligence – Automating, Evolving, Attacking
-
Adversarial Machine Learning in DDoS Attacks
-
ML-based target profiling and attack path optimization
-
-
Deep Reinforcement Learning for Dynamic Attack Strategies
-
AI bots adapting in real-time to evade detection and maximize impact
-
-
Bypassing AI Defenses: Adversarial Evasion & Model Poisoning
-
Techniques for manipulating and defeating ML-based IDS systems
-
-
Emerging Threat Vectors
-
AI-generated network traffic mimicking normal behavior
-
Practical Exercise
-
Build and test a simple anomaly detection model using Python (e.g., Random Forest or SVM)
-
Generate adversarial inputs using FGSM or textGAN
🔹 Day 3: Designing AI-Resilient IoT Architectures – From Detection to Defense
-
AI-Augmented Intrusion Detection & Prevention Systems (IDPS)
-
Supervised and unsupervised models for real-time traffic scoring
-
-
Federated Learning for Edge-Based Defense
-
Privacy-aware distributed models for smart devices
-
-
Security Orchestration, Automation, and Response (SOAR)
-
AI integration in automated mitigation pipelines
-
-
Governance, Risk, and Compliance (GRC)
-
Alignment with ISO/IEC 27001, NIST RMF, OWASP IoT Top 10, and GDPR
-
Capstone Design Project
-
Group design of a secure IoT network architecture
-
Threat modeling using STRIDE and MITRE ATT&CK for IoT
Mentor Profile
Fee Plan
Get an e-Certificate of Participation!

Intended For :
-
Cybersecurity professionals and network engineers
-
AI/ML practitioners working on threat detection
-
IoT product developers and embedded systems engineers
-
Researchers in cyber warfare, data forensics, and smart systems
-
Students with basic knowledge of networking and Python
Career Supporting Skills
Program Outcomes
-
Understand how AI is used offensively in modern DDoS attack strategies
-
Learn to simulate and detect malicious traffic patterns using ML models
-
Design AI-enhanced security layers for vulnerable IoT networks
-
Analyze large-scale network data for real-time anomaly identification
-
Receive global certification in AI-driven cybersecurity strategies
