Skip to main content

Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment

  • Conference paper
  • First Online:
Artificial Intelligence and Bioinspired Computational Methods (CSOC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1225))

Included in the following conference series:

Abstract

With the high rate of accepting Internet of Things (IoT) from individual nowadays. The IoT devices comprises television sets (TV), voice controller, smart lock, smart light, speakers, nest smoke alarm, air conditioning, ring doorbell and smart plug etc. Thus, the impact of IoT provides many industries with new ways of handling business operations such as procurement, manufacturing, distribution of goods and service, etc. With the aid of intelligent sensors, actuators, etc., the industries have revolutionized to an era known as Industry 4.0 (IR4.0), where business operations can be done and potentially optimized, by controlling interconnecting “things” via data communication channels. Similar to other electronic communication platforms in IoT ensuring security is paramount important especially in detecting the menace of the security challenges in the IoT environment. This paper aims to perform a comparative analysis between Denial of service (DoS) and Distributed denial of service (DDoS) attacks in the IoT environment. In essence, the comparative analysis reveals that the DDoS attack is the most significant attack to address in the IoT environment with about 68% Gbps requests compared to the DoS attack with 58% Gbps request.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pirmagomedov, R., Koucheryavy, Y.: IoT Technologies for Augmented Human: a Survey. Internet of Things, p. 100120 (2019)

    Google Scholar 

  2. Boubiche, D.E., Pathan, A.S.K., Lloret, J., Zhou, H., Hong, S., Amin, S.O., Feki, M.A.: Advanced industrial wireless sensor networks and intelligent IoT. IEEE Commun. Mag. 56(2), 14–15 (2018)

    Article  Google Scholar 

  3. Serpanos, D., Wolf, M.: Industrial internet of things. In: Internet-of-Things (IoT) Systems, pp. 37–54. Springer, Cham (2018)

    Google Scholar 

  4. Debauche, O., Mahmoudi, S., Manneback, P., Assila, A.: Fog IoT for health: a new architecture for patients and elderly monitoring. Procedia Comput. Sci. 160, 289–297 (2019)

    Article  Google Scholar 

  5. Aghili, S.F., Mala, H., Shojafar, M., Peris-Lopez, P.: LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 96, 410–424 (2019)

    Article  Google Scholar 

  6. Peraković, D., Periša, M., Cvitić, I.: Analysis of the IoT impact on volume of DDoS attacks. In: XXXIII Simpozijum o novim tehnologijama u poštanskom i telekomunikacionom saobraćaju–PosTel, 2015, pp. 295–304 (2015)

    Google Scholar 

  7. Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: REATO: REActing TO denial of service attacks in the internet of things. Comput. Netw. 137, 37–48 (2018)

    Article  Google Scholar 

  8. Liu, G., Quan, W., Cheng, N., Zhang, H., Yu, S.: Efficient DDoS attacks mitigation for stateful forwarding in internet of things. J. Netw. Comput. Appl. 130, 1–13 (2019)

    Article  Google Scholar 

  9. Roohi, A., Adeel, M., Shah, M.A.: DDoS in IoT: a roadmap towards security & countermeasures. In: 2019 25th International Conference on Automation and Computing (ICAC), pp. 1–6. IEEE, September 2019

    Google Scholar 

  10. Kajwadkar, S., Jain, V.K.: A novel algorithm for DoS and DDoS attack detection in internet of things. In: 2018 Conference on Information and Communication Technology (CICT), pp. 1–4. IEEE, October 2018

    Google Scholar 

  11. Boussada, R., Hamdane, B., Elhdhili, M.E., Saidane, L.A.: Privacy-preserving aware data transmission for IoT-based e-health. Comput. Netw. 162, 106866 (2019)

    Article  Google Scholar 

  12. Patil, A., Gaikwad, R.: Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor network. Procedia Comput. Sci. 48, 387–393 (2015)

    Article  Google Scholar 

  13. Carl, G., Kesidis, G., Brooks, R.R., Rai, S.: Denial-of-service attack-detection techniques. IEEE Internet Comput. 10(1), 82–89 (2006)

    Article  Google Scholar 

  14. Lachance, L., et al.: The Impact of Denial of Service Attacks in the IoT (2016). https://www.globalsign.com/en/blog/denial-of-service-in-the-iot/

  15. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  16. Moore, D., Voelker, G., Savage, S.: Inferring internet denial-of-service activity. In: 10th USENIX Security Symposium, Washington DC (2001)

    Google Scholar 

  17. Park, H., Li, P., Gao, D., Lee, H., Deng, R.H.: Distinguishing between FE and DDoS using randomness check. In: International Conference on Information Security, pp. 131–145. Springer, Heidelberg, September 2008

    Google Scholar 

  18. Baig, Z.A., Sanguanpong, S., Firdous, S.N., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198–209 (2020)

    Article  Google Scholar 

  19. Jazi, H.H., Gonzalez, H., Stakhanova, N., Ghorbani, A.A.: Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput. Netw. 121, 25–36 (2017)

    Article  Google Scholar 

  20. Bertino, E., Islam, N.: Botnets and internet of things security. Computer 2, 76–79 (2017)

    Article  Google Scholar 

  21. Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: 2013 IEEE International Conference on Space Science and Communication (IconSpace), pp. 361–365. IEEE, July 2013

    Google Scholar 

  22. Bugeja, J., Jacobsson, A., Davidsson, P.: On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 172–175. IEEE, August 2016

    Google Scholar 

  23. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE, December 2015

    Google Scholar 

  24. HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., Karimipour, H.: A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, p. 100129 (2019)

    Google Scholar 

  25. Da Cruz, M.A., Rodrigues, J.J., Lorenz, P., Solic, P., Al-Muhtadi, J., Albuquerque, V.H.C.: A proposal for bridging application layer protocols to HTTP on IoT solutions. Future Gener. Comput. Syst. 97, 145–152 (2019)

    Article  Google Scholar 

  26. Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE, January 2015

    Google Scholar 

  27. Ojeda Adan, M.F.: Designing an Internet of Things Attack Simulator (2019)

    Google Scholar 

  28. Keary, T.: Dos vs DDoS Attacks. Blog (2018). https://www.comparitech.com/net-admin/dos-vs-ddos-attacks-differences-prevention/?fbclid=IwAR3QQtEzPjiK8aHdn1TmXgJGcKIvEwXXWKNZixmukQ0ztUvi0sJkgeZJLB8#Broad_Types_of_DOS_and_DDOS_Attacks

  29. Chen, Q., Chen, H., Cai, Y., Zhang, Y., Huang, X.: Denial of service attack on IoT system. In: 2018 9th International Conference on Information Technology in Medicine and Education (ITME), pp. 755–758. IEEE, October 2018

    Google Scholar 

  30. Mullen, G., Meany, L.: Assessment of buffer overflow based attacks on an IoT operating system. In: 2019 Global IoT Summit (GIoTS), pp. 1–6. IEEE, June 2019

    Google Scholar 

  31. Bao, C., Guan, X., Sheng, Q., Zheng, K., Huang, X.: A tool for denial of service attack testing in IoT. Presented at the 1st Conference on Emerging Topics in Interactive Systems (2016)

    Google Scholar 

  32. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  33. Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS—the internet of distributed denial of service attacks. In: IoTBDS, pp. 47–58 (2017)

    Google Scholar 

  34. Tripathi, N., Mehtre, B.M.: DoS and DDoS attacks: impact, analysis and countermeasures. In: National Conference on Advances in Computing, Networking and Security, Nanded, India (2013). https://docs.google.com/viewer

  35. Hirakawa, T., Ogura, K., Bista, B.B., Takata, T.: A defense method against distributed slow HTTP DoS attack. In: 2016 19th International Conference on Network-Based Information Systems (NBiS), pp. 152–158. IEEE, September 2016

    Google Scholar 

  36. Huraj, L., Simon, M., Horák, T.: IoT measuring of UDP-based distributed reflective DoS attack. In: 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), pp. 000209–000214. IEEE, September 2018

    Google Scholar 

  37. Pajila, P.B., Julie, E.G.: Detection of DDoS attack using SDN in IoT: a survey. In: Intelligent Communication Technologies and Virtual Mobile Networks, pp. 438–452. Springer, Cham (2019)

    Google Scholar 

  38. Kambourakis, G., Kolias, C., Stavrou, A.: The mirai botnet and the IoT zombie armies. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), pp. 267–272. IEEE (2017)

    Google Scholar 

Download references

Acknowledgement

The research was fully supported by the Centre of Graduate Studies (CGS). The authors fully acknowledge the Universiti Teknologi PETRONAS (UTP) for financial support, which has made this research possible.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulrahman Aminu Ghali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aminu Ghali, A., Ahmad, R., Alhussian, H.S.A. (2020). Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment. In: Silhavy, R. (eds) Artificial Intelligence and Bioinspired Computational Methods. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1225. Springer, Cham. https://doi.org/10.1007/978-3-030-51971-1_15

Download citation

Publish with us

Policies and ethics