1,119 Hits in 4.2 sec

Detection and Prevention Algorithm of DDoS Attack Over the IOT Networks

2020 TEM Journal  
It is divided into two parts, one for detecting the DDoS attack in the IoT end devices and the other for mitigating the impact of the attack placed on the border router.  ...  One of the most notorious security issues in the IoT is the Distributed Denial of Service (DDoS) attack.  ...  According to the results, the proposed approach could effectively help the IoT network environment in detecting DDoS attacks and defense against it.  ... 
doi:10.18421/tem93-09 fatcat:e6xbagayjbayfbybjmkh7etg3q

Traffic flow features as metrics (TFFM): detection of application layer level DDOS attack scope of IOT traffic flows

Kalathiripi Rambabu, N Venkatram
2018 International Journal of Engineering & Technology  
The performance analysis was done empirically by using the synthesized traffic flows that are high in volume and source of attacks.  ...  The botnets such as "mirae" noticed in recent past exploits the IoT devises and tune them to flood the traffic flow such that the target network exhaust to response to benevolent requests.  ...  But very few works have been put forward for handling DDoS attack issue in the IoT environment despite the fact that DDoS can pose serious challenges in the IoT context.  ... 
doi:10.14419/ijet.v7i2.7.10293 fatcat:c5egjc6tnresbol6un7yjfe5um

Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid [article]

Jianhua Li, Ximeng Liu, Jiong Jin, Shui Yu
2021 arXiv   pre-print
Under this circumstance, we revisit the DDoS attack and defense in terms of attacking cost and populations of both parties, proposing a joint defense framework to incur higher attacking expense in a grid  ...  Due to remarkable profits, crackers favor DDoS as cybersecurity weapons in attacking servers, computers, IoT devices, and even the entire Internet.  ...  Any attack sourced from a node in the grid is easily blocked and removed at the source-end.  ... 
arXiv:2104.00236v1 fatcat:jcngyfdrvnfs7lq4i4bdvrujnq

Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments

Ahamed Aljuhani
2021 IEEE Access  
in IoT environments.  ...  This paper analyzes recent studies concerning DDoS detection methods that have adapted single and hybrid ML approaches in modern networking environments.  ...  [110] reviewed DDoS defense systems in the context of the IoT environment.  ... 
doi:10.1109/access.2021.3062909 fatcat:xtj576lfsffrbpiqyk2kv5wuam

Taxonomy of DDoS attacks and their defense mechanisms in IoT

Nimisha Pandey, Pramod Kumar Mishra
2021 Journal of scientific research  
IoT promised great involvement in the industry as per the earlier predictions of many researchers but IoT did not pierce various industries to that extent.  ...  Recently, there have been many DDoS attacks using IoT devices opening the possibility of DDoS attacks on the IoT systems vastly.  ...  Classification on the basis of Deployment Location On the basis of deployment location, [15] classified the DDoS defense mechanisms in three categories, namely, source-end, victim-end, and intermediate  ... 
doi:10.37398/jsr.2021.650523 fatcat:hdq7oupn6zfvndqghb6jjh6bwi


Jeet kaur
2017 International Journal of Advanced Research in Computer Science  
There are such a lot of kinds of vulnerability but right here in this paper we pay attention on Distributed Denial of Service assault (DDoS).  ...  block the usage for real user and make network resource unavailable, consume bandwidth; if comparable assault is penetrated from exceptional resources its name DDoS.In this paper we will discuss various IoT  ...  Considering the traits of IoT environment, all such preconditions have to be avoided inside the layout of IoT defense tool.  ... 
doi:10.26483/ijarcs.v8i9.5008 fatcat:ejhkoqfzrrbo7mfdxgmttjpbuq

A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework

Da Yin, Lianming Zhang, Kun Yang
2018 IEEE Access  
rate at boundary SD-IoT switch ports is used to determine whether DDoS attacks occur in the IoT.  ...  A recent distributed denial-of-service (DDoS) attack revealed the ubiquity of vulnerabilities in IoT, and many IoT devices unwittingly contributed to the DDoS attack.  ...  if 18: end while 19: if s = sum then 20: return α 21: end if 22: end if of the DDoS attack flow is basically flat, and the change is not obvious.  ... 
doi:10.1109/access.2018.2831284 fatcat:pdwrjwbjdbc4jmno7cxbvavwn4

A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios

Felipe S. Dantas Silva, Esau Silva, Emidio P. Neto, Marcilio Lemos, Augusto J. Venancio Neto, Flavio Esposito
2020 Sensors  
The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years.  ...  This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios.  ...  approaches to assist the SDN defense of IoT environments.  ... 
doi:10.3390/s20113078 pmid:32485943 pmcid:PMC7309081 fatcat:v4dd357ednbkdewpvmue6xwdsa

Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service

Vinay Sachidananda, Suhas Bhairav, Yuval Elovici
2018 EAI Endorsed Transactions on Security and Safety  
We have conducted large-scale experimentation with real IoT devices in our security IoT testbed.  ...  In this work, we focus on a large-scale extensive study of various forms of DoS and how it can be exploited in different protocols of IoT.  ...  We intend to apply and calibrate these metrics in the future to develop various defense mechanisms for IoT against DoS attacks.  ... 
doi:10.4108/eai.13-7-2018.159803 fatcat:irivzsnynbhz7ihf7zgiz5hnai

Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms

2022 International Journal on Semantic Web and Information Systems (IJSWIS)  
Further, we talk about popular performance metrics that evaluate the defense schemes. In the end, we list prevalent DDoS attack tools and open challenges.  ...  The expeditious surge in the collaborative environments, like IoT, cloud computing and SDN, have provided attackers with countless new avenues to benefit from the distributed nature of DDoS attacks.  ...  DDoS Detection in a Cloud-Based Environment As explained in Section 4.2, the DDoS attacks in a cloud-based environment could end up having some disastrous consequences.  ... 
doi:10.4018/ijswis.297143 fatcat:imoau72665dxbmfdoxvntbyyiq

IOT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN

S. E. Viswapriya, S. Dinesh, D. Viswa Ravi Teja
2021 International journal of computer science and mobile computing  
Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and mitigate.  ...  This is applicable to work in a distributed system. It will tolerate a little number of attackers for collision.  ...  Compare the effectiveness of continuous and targeted DoS attacks on IoT devices in a LoRaWAN environment.  ... 
doi:10.47760/ijcsmc.2021.v10i04.003 fatcat:zt4s2w57lzhynpyqkuq6nyhb7e

DoS and DDoS vulnerability of IoT: A review

Emina Džaferović, Ajla Sokol, Ali Abd Almisreb, Syamimi Mohd Norzeli
2019 Sustainable Engineering and Innovation, ISSN 2712-0562  
Internet of Things (IoT) paradigm became particularly popular in the last couple of years in such a way that the devices are present in almost every home across the globe.  ...  In this paper we focus on Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks and we provide a review of the current architecture of Internet of Things which is prone to these.  ...  Authors Bhardwaj et al [26] explore the option of DDoS attacks prevention in IoT using edge computing, where the edge computing, by their definition, is usage of computing resources near the end devices  ... 
doi:10.37868/sei.v1i1.36 fatcat:ucvlpq63nrbnxj2upyzhtk5pjq

Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge [article]

Jianhua Li, Ximeng Liu, Jiong JIn, Shui Yu
2021 arXiv   pre-print
Hence, we revisit the DDoS attack and defense, clarifying the advantages and disadvantages of both parties.  ...  We further propose a joint defense framework to defeat attackers by incurring a significant increment of required bots and enlarging attack expenses.  ...  RELATED WORK There are three locations to detect and mitigate DDoS traffic along the path, including source-end, victim-end, and in-network [5] .  ... 
arXiv:2107.01382v1 fatcat:lswm5ev2p5gkvguibpaywqocdq

SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network

Muhammad Ibrahim, Muhammad Hanif, Shabir Ahmad, Faisal Jamil, Tayyaba Sehar, YunJung Lee, DoHyeun Kim
2022 Computers Materials & Continua  
The proposed approach helps in detecting the DoS/DDoS attacks on the IoT fitness system and then mitigating the attacks.  ...  This work focuses on IoT security, especially DoS/DDoS attacks.  ...  The authors discussed IoT and the Cloud environment, providing a complete view of DDoS attacks and defensive measures.  ... 
doi:10.32604/cmc.2022.017772 fatcat:k7klkv6dn5h4tpeyp6r3fiwk3y

IoT-Botnet Detection and Isolation by Access Routers

Christian Dietz, Raphael Labaca Castro, Jessica Steinberger, Cezary Wilczak, Marcel Antzek, Anna Sperotto, Aiko Pras
2018 2018 9th International Conference on the Network of the Future (NOF)  
for customers and end users.  ...  In recent years, emerging technologies such as the Internet of Things gain increasing interest in various communities.  ...  Even though, SPIN provides an open source solution which can be used by end-users free of charge, it mainly focuses on detecting and stopping ongoing DDoS attacks.  ... 
doi:10.1109/nof.2018.8598138 dblp:conf/nof/DietzCSWASP18 fatcat:gesl2l6tcfbcdopbffq24glqeq
« Previous Showing results 1 — 15 out of 1,119 results