Skip to main content
Erschienen in: Telecommunication Systems 1/2020

29.07.2019

A survey of DDoS attacking techniques and defence mechanisms in the IoT network

verfasst von: Ruchi Vishwakarma, Ankit Kumar Jain

Erschienen in: Telecommunication Systems | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by interacting with numerous smart applications running independently on different platforms, almost everywhere in the world. IoT, with such a ubiquitous popularity often serve itself as a potential platform for escalating malicious entities. These entities get an access to the legitimate devices by exploiting IoT vulnerabilities which results from several constraints like limited resources, weaker security, etc. and can further take form of various attacks. Distributed Denial-of-service (DDoS) in IoT network is an attack which targets the availability of the servers by flooding the communication channel with impersonated requests coming from distributed IoT devices. Defending DDoS in IoT has now become an exigent area of research due to the recent incidents of demolishment of some renowned servers, reported in previous few years. In this paper, we discuss the concept of malware and botnets working behind ‘Distributed’ DoS in IoT. The various DDoS defence techniques are broadly described and compared in order to identify the security gaps present in them. Moreover, we list out the open research issues and challenges that need to be addressed for a stronger as well as smarter DDoS defence.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., et al. (2018). Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security,2(2), 97–110.CrossRef Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., et al. (2018). Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security,2(2), 97–110.CrossRef
2.
Zurück zum Zitat Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal,6(2), 1606–1616.CrossRef Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal,6(2), 1606–1616.CrossRef
3.
Zurück zum Zitat Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks,57(10), 2266–2279.CrossRef Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks,57(10), 2266–2279.CrossRef
6.
Zurück zum Zitat Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems,29(7), 1645–1660.CrossRef Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems,29(7), 1645–1660.CrossRef
7.
Zurück zum Zitat Lee, J. H., & Kim, H. (2017). Security and privacy challenges in the internet of things [security and privacy matters]. IEEE Consumer Electronics Magazine,6(3), 134–136.CrossRef Lee, J. H., & Kim, H. (2017). Security and privacy challenges in the internet of things [security and privacy matters]. IEEE Consumer Electronics Magazine,6(3), 134–136.CrossRef
8.
Zurück zum Zitat Fortino, G., & Trunfio, P. (Eds.). (2014). Internet of things based on smart objects: Technology, middleware, and applications. Berlin: Springer. Fortino, G., & Trunfio, P. (Eds.). (2014). Internet of things based on smart objects: Technology, middleware, and applications. Berlin: Springer.
9.
Zurück zum Zitat Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 9th international conference on computational intelligence and security (CIS) (pp. 663–667). IEEE. Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 9th international conference on computational intelligence and security (CIS) (pp. 663–667). IEEE.
10.
Zurück zum Zitat Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer,50(7), 80–84.CrossRef Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer,50(7), 80–84.CrossRef
11.
Zurück zum Zitat Lohachab, A., & Karambir, B. (2018). Critical analysis of DDoS—An emerging security threat over IoT networks. Journal of Communications and Information Networks,3(3), 57–78.CrossRef Lohachab, A., & Karambir, B. (2018). Critical analysis of DDoS—An emerging security threat over IoT networks. Journal of Communications and Information Networks,3(3), 57–78.CrossRef
12.
Zurück zum Zitat Sicari, S., Rizzardi, A., Miorandi, D., & Coen-Porisini, A. (2018). REATO: REActing TO Denial of Service attacks in the Internet of Things. Computer Networks,137, 37–48.CrossRef Sicari, S., Rizzardi, A., Miorandi, D., & Coen-Porisini, A. (2018). REATO: REActing TO Denial of Service attacks in the Internet of Things. Computer Networks,137, 37–48.CrossRef
21.
Zurück zum Zitat Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials,15(4), 2046–2069.CrossRef Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials,15(4), 2046–2069.CrossRef
22.
Zurück zum Zitat Mendez, D. M., Papapanagiotou, I., & Yang, B. (2017). Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879. Mendez, D. M., Papapanagiotou, I., & Yang, B. (2017). Internet of things: Survey on security and privacy. arXiv preprint arXiv:​1707.​01879.
23.
Zurück zum Zitat McDermott, C. D., Petrovski, A. V., & Majdani, F. (2018, June). Towards situational awareness of botnet activity in the internet of things. In 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA) (pp. 1–8). IEEE. McDermott, C. D., Petrovski, A. V., & Majdani, F. (2018, June). Towards situational awareness of botnet activity in the internet of things. In 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA) (pp. 1–8). IEEE.
24.
Zurück zum Zitat Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer,2, 76–79.CrossRef Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer,2, 76–79.CrossRef
25.
Zurück zum Zitat Jerkins, J. A. (2017). Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1–5). IEEE. Jerkins, J. A. (2017). Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1–5). IEEE.
31.
Zurück zum Zitat Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defence mechanisms. ACM SIGCOMM Computer Communication Review,34(2), 39–53.CrossRef Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defence mechanisms. ACM SIGCOMM Computer Communication Review,34(2), 39–53.CrossRef
32.
Zurück zum Zitat Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv preprint arXiv:1208.0403. Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv preprint arXiv:​1208.​0403.
33.
Zurück zum Zitat Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing,5(4), 586–602.CrossRef Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing,5(4), 586–602.CrossRef
34.
Zurück zum Zitat Specht, S. M., & Lee, R. B. (2004). Distributed denial of service: Taxonomies of attacks, tools, and countermeasures. In ISCA PDCS (pp. 543–550). Specht, S. M., & Lee, R. B. (2004). Distributed denial of service: Taxonomies of attacks, tools, and countermeasures. In ISCA PDCS (pp. 543–550).
35.
Zurück zum Zitat Lemon, J. (2002, February). Resisting SYN flood DoS attacks with a SYN Cache. In BSDCon (Vol. 2002, pp. 89–97). Lemon, J. (2002, February). Resisting SYN flood DoS attacks with a SYN Cache. In BSDCon (Vol. 2002, pp. 89–97).
36.
Zurück zum Zitat Kambourakis, G., Moschos, T., Geneiatakis, D., & Gritzalis, S. (2007, October). Detecting DNS amplification attacks. In International workshop on critical information infrastructures security (pp. 185–196). Berlin: Springer. Kambourakis, G., Moschos, T., Geneiatakis, D., & Gritzalis, S. (2007, October). Detecting DNS amplification attacks. In International workshop on critical information infrastructures security (pp. 185–196). Berlin: Springer.
37.
Zurück zum Zitat Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Exit from hell? Reducing the impact of amplification DDoS attacks. In USENIX Security Symposium (pp. 111–125). Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Exit from hell? Reducing the impact of amplification DDoS attacks. In USENIX Security Symposium (pp. 111–125).
38.
Zurück zum Zitat Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defence mechanisms: Classification and state-of-the-art. Computer Networks,44(5), 643–666.CrossRef Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defence mechanisms: Classification and state-of-the-art. Computer Networks,44(5), 643–666.CrossRef
39.
Zurück zum Zitat Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed denial of service attacks. In 2000 IEEE international conference on systems, man, and cybernetics (Vol. 3, pp. 2275–2280). IEEE. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed denial of service attacks. In 2000 IEEE international conference on systems, man, and cybernetics (Vol. 3, pp. 2275–2280). IEEE.
41.
Zurück zum Zitat Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival,53(1), 23–40.CrossRef Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival,53(1), 23–40.CrossRef
44.
Zurück zum Zitat Mergendahl, S., Sisodia, D., Li, J., & Cam, H. (2017). Source-end DDoS defence in IoT environments. In Proceedings of the 2017 workshop on internet of things security and privacy (pp. 63–64). ACM. Mergendahl, S., Sisodia, D., Li, J., & Cam, H. (2017). Source-end DDoS defence in IoT environments. In Proceedings of the 2017 workshop on internet of things security and privacy (pp. 63–64). ACM.
45.
Zurück zum Zitat Anirudh, M., Thileeban, S. A., & Nallathambi, D. J. (2017, January). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In 2017 International conference on computer, communication and signal processing (ICCCSP) (pp. 1–4). IEEE. Anirudh, M., Thileeban, S. A., & Nallathambi, D. J. (2017, January). Use of honeypots for mitigating DoS attacks targeted on IoT networks. In 2017 International conference on computer, communication and signal processing (ICCCSP) (pp. 1–4). IEEE.
46.
Zurück zum Zitat Misra, S., Krishna, P. V., Agarwal, H., Saxena, A., & Obaidat, M. S. (2011). A learning automata-based solution for preventing distributed denial of service in Internet of things. In 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (pp. 114–122). IEEE. Misra, S., Krishna, P. V., Agarwal, H., Saxena, A., & Obaidat, M. S. (2011). A learning automata-based solution for preventing distributed denial of service in Internet of things. In 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing (pp. 114–122). IEEE.
47.
Zurück zum Zitat Ahmed, M. E., & Kim, H. (2017). DDoS attack mitigation in Internet of Things using software defined networking. In 2017 IEEE third international conference on big data computing service and applications (BigDataService) (pp. 271–276). IEEE. Ahmed, M. E., & Kim, H. (2017). DDoS attack mitigation in Internet of Things using software defined networking. In 2017 IEEE third international conference on big data computing service and applications (BigDataService) (pp. 271–276). IEEE.
48.
Zurück zum Zitat Adat, V., Gupta, B. B., & Yamaguchi, S. (2017, November). Risk transfer mechanism to defend DDoS attacks in IoT scenario. In 2017 IEEE international symposium on consumer electronics (ISCE) (pp. 37–40). IEEE. Adat, V., Gupta, B. B., & Yamaguchi, S. (2017, November). Risk transfer mechanism to defend DDoS attacks in IoT scenario. In 2017 IEEE international symposium on consumer electronics (ISCE) (pp. 37–40). IEEE.
49.
Zurück zum Zitat Matheu-García, S. N., Hernández-Ramos, J. L., Skarmeta, A. F., & Baldini, G. (2019). Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces,62, 64–83.CrossRef Matheu-García, S. N., Hernández-Ramos, J. L., Skarmeta, A. F., & Baldini, G. (2019). Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces,62, 64–83.CrossRef
50.
Zurück zum Zitat Javaid, U., Siang, A. K., Aman, M. N., & Sikdar, B. (June 2018). Mitigating loT device based DDoS attacks using blockchain. In Proceedings of the 1st workshop on cryptocurrencies and blockchains for distributed systems (pp. 71–76). ACM. Javaid, U., Siang, A. K., Aman, M. N., & Sikdar, B. (June 2018). Mitigating loT device based DDoS attacks using blockchain. In Proceedings of the 1st workshop on cryptocurrencies and blockchains for distributed systems (pp. 71–76). ACM.
51.
Zurück zum Zitat Sagirlar, G., Carminati, B., & Ferrari, E. (2018, October). AutoBotCatcher: blockchain-based P2P botnet detection for the internet of things. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC) (pp. 1–8). IEEE. Sagirlar, G., Carminati, B., & Ferrari, E. (2018, October). AutoBotCatcher: blockchain-based P2P botnet detection for the internet of things. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC) (pp. 1–8). IEEE.
52.
Zurück zum Zitat Su, J., Vargas, D. V., Prasad, S., Sgandurra, D., Feng, Y., & Sakurai, K. (2018). Lightweight classification of IoT malware based on image recognition. arXiv preprint arXiv:1802.03714. Su, J., Vargas, D. V., Prasad, S., Sgandurra, D., Feng, Y., & Sakurai, K. (2018). Lightweight classification of IoT malware based on image recognition. arXiv preprint arXiv:​1802.​03714.
53.
Zurück zum Zitat Zhou, L., Guo, H., & Deng, G. (2019). A fog computing-based approach to DDoS mitigation in IoT systems. Computers & Security,85, 51–62.CrossRef Zhou, L., Guo, H., & Deng, G. (2019). A fog computing-based approach to DDoS mitigation in IoT systems. Computers & Security,85, 51–62.CrossRef
54.
Zurück zum Zitat Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine learning DDoS detection for consumer internet of things devices. arXiv preprint arXiv:1804.04159. Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine learning DDoS detection for consumer internet of things devices. arXiv preprint arXiv:​1804.​04159.
55.
Zurück zum Zitat Singh, K., Guntuku, S. C., Thakur, A., & Hota, C. (2014). Big data analytics framework for peer-to-peer botnet detection using random forests. Information Sciences,278, 488–497.CrossRef Singh, K., Guntuku, S. C., Thakur, A., & Hota, C. (2014). Big data analytics framework for peer-to-peer botnet detection using random forests. Information Sciences,278, 488–497.CrossRef
56.
Zurück zum Zitat Haddad Pajouh, H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Generation Computer Systems,85, 88–96.CrossRef Haddad Pajouh, H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Generation Computer Systems,85, 88–96.CrossRef
57.
Zurück zum Zitat McDermott, C. D., Majdani, F., & Petrovski, A. V. (2018, July). Botnet detection in the internet of things using deep learning approaches. In 2018 international joint conference on neural networks (IJCNN) (pp. 1–8). IEEE. McDermott, C. D., Majdani, F., & Petrovski, A. V. (2018, July). Botnet detection in the internet of things using deep learning approaches. In 2018 international joint conference on neural networks (IJCNN) (pp. 1–8). IEEE.
58.
Zurück zum Zitat Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., et al. (2018). N-BaIoT—Network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing,17(3), 12–22.CrossRef Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., et al. (2018). N-BaIoT—Network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing,17(3), 12–22.CrossRef
59.
Zurück zum Zitat Zhang, C., & Green, R. (2015). Communication security on the internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th symposium on communications and networking (pp. 8–15). Society for Computer Simulation International. Zhang, C., & Green, R. (2015). Communication security on the internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th symposium on communications and networking (pp. 8–15). Society for Computer Simulation International.
60.
Zurück zum Zitat Sonar, K., & Upadhyay, H. (2016). An approach to secure internet of things against DDoS. In Proceedings of international conference on ICT for sustainable development (pp. 367–376). Singapore: Springer. Sonar, K., & Upadhyay, H. (2016). An approach to secure internet of things against DDoS. In Proceedings of international conference on ICT for sustainable development (pp. 367–376). Singapore: Springer.
61.
Zurück zum Zitat De Donno, M., Dragoni, N., Giaretta, A., & Spognardi, A. (2018). DDoS-capable IoT malwares: Comparative analysis and Mirai investigation. In Security and Communication Networks, 2018. De Donno, M., Dragoni, N., Giaretta, A., & Spognardi, A. (2018). DDoS-capable IoT malwares: Comparative analysis and Mirai investigation. In Security and Communication Networks, 2018.
62.
Zurück zum Zitat Adat, V., & Gupta, B. B. (2017, April). A DDoS attack mitigation framework for the internet of things. In 2017 international conference on communication and signal processing (ICCSP) (pp. 2036–2041). IEEE. Adat, V., & Gupta, B. B. (2017, April). A DDoS attack mitigation framework for the internet of things. In 2017 international conference on communication and signal processing (ICCSP) (pp. 2036–2041). IEEE.
63.
Zurück zum Zitat Adat, V., Dahiya, A., & Gupta, B. B. (2018, January). Economic incentive-based solution against distributed denial of service attacks for IoT customers. In 2018 IEEE international conference on consumer electronics (ICCE) (pp. 1–5). IEEE. Adat, V., Dahiya, A., & Gupta, B. B. (2018, January). Economic incentive-based solution against distributed denial of service attacks for IoT customers. In 2018 IEEE international conference on consumer electronics (ICCE) (pp. 1–5). IEEE.
64.
Zurück zum Zitat Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today’s intranet of things to a future internet of things: A wireless-and mobility-related view. IEEE Wireless Communications,17(6), 44–51.CrossRef Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today’s intranet of things to a future internet of things: A wireless-and mobility-related view. IEEE Wireless Communications,17(6), 44–51.CrossRef
65.
Zurück zum Zitat Dou, W., Chen, Q., & Chen, J. (2013). A confidence-based filtering method for DDoS attack defence in cloud environment. Future Generation Computer Systems,29(7), 1838–1850.CrossRef Dou, W., Chen, Q., & Chen, J. (2013). A confidence-based filtering method for DDoS attack defence in cloud environment. Future Generation Computer Systems,29(7), 1838–1850.CrossRef
66.
Zurück zum Zitat Afek, Y., Bremler-Barr, A., & Touitou, D. (2010). U.S. Patent No. 7,707,305. Washington, DC: U.S. Patent and Trademark Office. Afek, Y., Bremler-Barr, A., & Touitou, D. (2010). U.S. Patent No. 7,707,305. Washington, DC: U.S. Patent and Trademark Office.
67.
Zurück zum Zitat Alpaydin, E. (2009). Introduction to machine learning. Cambridge: MIT Press. Alpaydin, E. (2009). Introduction to machine learning. Cambridge: MIT Press.
68.
Zurück zum Zitat Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications,54, 1–31.CrossRef Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications,54, 1–31.CrossRef
69.
Zurück zum Zitat Mirkovic, J., Prier, G., & Reiher, P. (2002, November). Attacking DDoS at the source. In Proceedings. 10th IEEE International Conference on Network Protocols, 2002 (pp. 312–321). IEEE. Mirkovic, J., Prier, G., & Reiher, P. (2002, November). Attacking DDoS at the source. In Proceedings. 10th IEEE International Conference on Network Protocols, 2002 (pp. 312–321). IEEE.
70.
Zurück zum Zitat Musca, C., Mirica, E., & Deaconescu, R. (2013). Detecting and analyzing zero-day attacks using honeypots. In 2013 19th international conference on control systems and computer science (CSCS) (pp. 543–548). IEEE. Musca, C., Mirica, E., & Deaconescu, R. (2013). Detecting and analyzing zero-day attacks using honeypots. In 2013 19th international conference on control systems and computer science (CSCS) (pp. 543–548). IEEE.
71.
Zurück zum Zitat Casas, P., Mazel, J., & Owezarski, P. (2012). Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Computer Communications,35(7), 772–783.CrossRef Casas, P., Mazel, J., & Owezarski, P. (2012). Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Computer Communications,35(7), 772–783.CrossRef
72.
Zurück zum Zitat Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks,81, 308–319.CrossRef Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks,81, 308–319.CrossRef
73.
Zurück zum Zitat François, J., Aib, I., & Boutaba, R. (2012). FireCol: A collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Transactions on Networking (TON),20(6), 1828–1841.CrossRef François, J., Aib, I., & Boutaba, R. (2012). FireCol: A collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Transactions on Networking (TON),20(6), 1828–1841.CrossRef
74.
Zurück zum Zitat Sonar, K., & Upadhyay, H. (2014). A survey: DDOS attack on Internet of Things. International Journal of Engineering Research and Development,10(11), 58–63. Sonar, K., & Upadhyay, H. (2014). A survey: DDOS attack on Internet of Things. International Journal of Engineering Research and Development,10(11), 58–63.
75.
Zurück zum Zitat Zhang, C., & Green, R. (2015, April). Communication security in internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th symposium on communications and networking (pp. 8–15). Society for Computer Simulation International. Zhang, C., & Green, R. (2015, April). Communication security in internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th symposium on communications and networking (pp. 8–15). Society for Computer Simulation International.
76.
Zurück zum Zitat Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal,4(5), 1250–1258.CrossRef Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal,4(5), 1250–1258.CrossRef
78.
Zurück zum Zitat Dougherty, J., Kohavi, R., & Sahami, M. (1995). Supervised and unsupervised discretization of continuous features. In Machine learning proceedings 1995 (pp. 194–202). Dougherty, J., Kohavi, R., & Sahami, M. (1995). Supervised and unsupervised discretization of continuous features. In Machine learning proceedings 1995 (pp. 194–202).
79.
Zurück zum Zitat Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems,100, 779–796.CrossRef Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems,100, 779–796.CrossRef
80.
Zurück zum Zitat Li, L., & Lee, G. (2005). DDoS attack detection and wavelets. Telecommunication Systems,28(3–4), 435–451.CrossRef Li, L., & Lee, G. (2005). DDoS attack detection and wavelets. Telecommunication Systems,28(3–4), 435–451.CrossRef
Metadaten
Titel
A survey of DDoS attacking techniques and defence mechanisms in the IoT network
verfasst von
Ruchi Vishwakarma
Ankit Kumar Jain
Publikationsdatum
29.07.2019
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2020
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-019-00599-z

Weitere Artikel der Ausgabe 1/2020

Telecommunication Systems 1/2020 Zur Ausgabe