Abstract
With the high rate of accepting Internet of Things (IoT) from individual nowadays. The IoT devices comprises television sets (TV), voice controller, smart lock, smart light, speakers, nest smoke alarm, air conditioning, ring doorbell and smart plug etc. Thus, the impact of IoT provides many industries with new ways of handling business operations such as procurement, manufacturing, distribution of goods and service, etc. With the aid of intelligent sensors, actuators, etc., the industries have revolutionized to an era known as Industry 4.0 (IR4.0), where business operations can be done and potentially optimized, by controlling interconnecting “things” via data communication channels. Similar to other electronic communication platforms in IoT ensuring security is paramount important especially in detecting the menace of the security challenges in the IoT environment. This paper aims to perform a comparative analysis between Denial of service (DoS) and Distributed denial of service (DDoS) attacks in the IoT environment. In essence, the comparative analysis reveals that the DDoS attack is the most significant attack to address in the IoT environment with about 68% Gbps requests compared to the DoS attack with 58% Gbps request.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pirmagomedov, R., Koucheryavy, Y.: IoT Technologies for Augmented Human: a Survey. Internet of Things, p. 100120 (2019)
Boubiche, D.E., Pathan, A.S.K., Lloret, J., Zhou, H., Hong, S., Amin, S.O., Feki, M.A.: Advanced industrial wireless sensor networks and intelligent IoT. IEEE Commun. Mag. 56(2), 14–15 (2018)
Serpanos, D., Wolf, M.: Industrial internet of things. In: Internet-of-Things (IoT) Systems, pp. 37–54. Springer, Cham (2018)
Debauche, O., Mahmoudi, S., Manneback, P., Assila, A.: Fog IoT for health: a new architecture for patients and elderly monitoring. Procedia Comput. Sci. 160, 289–297 (2019)
Aghili, S.F., Mala, H., Shojafar, M., Peris-Lopez, P.: LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 96, 410–424 (2019)
Peraković, D., Periša, M., Cvitić, I.: Analysis of the IoT impact on volume of DDoS attacks. In: XXXIII Simpozijum o novim tehnologijama u poštanskom i telekomunikacionom saobraćaju–PosTel, 2015, pp. 295–304 (2015)
Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: REATO: REActing TO denial of service attacks in the internet of things. Comput. Netw. 137, 37–48 (2018)
Liu, G., Quan, W., Cheng, N., Zhang, H., Yu, S.: Efficient DDoS attacks mitigation for stateful forwarding in internet of things. J. Netw. Comput. Appl. 130, 1–13 (2019)
Roohi, A., Adeel, M., Shah, M.A.: DDoS in IoT: a roadmap towards security & countermeasures. In: 2019 25th International Conference on Automation and Computing (ICAC), pp. 1–6. IEEE, September 2019
Kajwadkar, S., Jain, V.K.: A novel algorithm for DoS and DDoS attack detection in internet of things. In: 2018 Conference on Information and Communication Technology (CICT), pp. 1–4. IEEE, October 2018
Boussada, R., Hamdane, B., Elhdhili, M.E., Saidane, L.A.: Privacy-preserving aware data transmission for IoT-based e-health. Comput. Netw. 162, 106866 (2019)
Patil, A., Gaikwad, R.: Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor network. Procedia Comput. Sci. 48, 387–393 (2015)
Carl, G., Kesidis, G., Brooks, R.R., Rai, S.: Denial-of-service attack-detection techniques. IEEE Internet Comput. 10(1), 82–89 (2006)
Lachance, L., et al.: The Impact of Denial of Service Attacks in the IoT (2016). https://www.globalsign.com/en/blog/denial-of-service-in-the-iot/
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Moore, D., Voelker, G., Savage, S.: Inferring internet denial-of-service activity. In: 10th USENIX Security Symposium, Washington DC (2001)
Park, H., Li, P., Gao, D., Lee, H., Deng, R.H.: Distinguishing between FE and DDoS using randomness check. In: International Conference on Information Security, pp. 131–145. Springer, Heidelberg, September 2008
Baig, Z.A., Sanguanpong, S., Firdous, S.N., Nguyen, T.G., So-In, C.: Averaged dependence estimators for DoS attack detection in IoT networks. Future Gener. Comput. Syst. 102, 198–209 (2020)
Jazi, H.H., Gonzalez, H., Stakhanova, N., Ghorbani, A.A.: Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Comput. Netw. 121, 25–36 (2017)
Bertino, E., Islam, N.: Botnets and internet of things security. Computer 2, 76–79 (2017)
Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: 2013 IEEE International Conference on Space Science and Communication (IconSpace), pp. 361–365. IEEE, July 2013
Bugeja, J., Jacobsson, A., Davidsson, P.: On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 172–175. IEEE, August 2016
Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE, December 2015
HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., Karimipour, H.: A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, p. 100129 (2019)
Da Cruz, M.A., Rodrigues, J.J., Lorenz, P., Solic, P., Al-Muhtadi, J., Albuquerque, V.H.C.: A proposal for bridging application layer protocols to HTTP on IoT solutions. Future Gener. Comput. Syst. 97, 145–152 (2019)
Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE, January 2015
Ojeda Adan, M.F.: Designing an Internet of Things Attack Simulator (2019)
Keary, T.: Dos vs DDoS Attacks. Blog (2018). https://www.comparitech.com/net-admin/dos-vs-ddos-attacks-differences-prevention/?fbclid=IwAR3QQtEzPjiK8aHdn1TmXgJGcKIvEwXXWKNZixmukQ0ztUvi0sJkgeZJLB8#Broad_Types_of_DOS_and_DDOS_Attacks
Chen, Q., Chen, H., Cai, Y., Zhang, Y., Huang, X.: Denial of service attack on IoT system. In: 2018 9th International Conference on Information Technology in Medicine and Education (ITME), pp. 755–758. IEEE, October 2018
Mullen, G., Meany, L.: Assessment of buffer overflow based attacks on an IoT operating system. In: 2019 Global IoT Summit (GIoTS), pp. 1–6. IEEE, June 2019
Bao, C., Guan, X., Sheng, Q., Zheng, K., Huang, X.: A tool for denial of service attack testing in IoT. Presented at the 1st Conference on Emerging Topics in Interactive Systems (2016)
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)
Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS—the internet of distributed denial of service attacks. In: IoTBDS, pp. 47–58 (2017)
Tripathi, N., Mehtre, B.M.: DoS and DDoS attacks: impact, analysis and countermeasures. In: National Conference on Advances in Computing, Networking and Security, Nanded, India (2013). https://docs.google.com/viewer
Hirakawa, T., Ogura, K., Bista, B.B., Takata, T.: A defense method against distributed slow HTTP DoS attack. In: 2016 19th International Conference on Network-Based Information Systems (NBiS), pp. 152–158. IEEE, September 2016
Huraj, L., Simon, M., Horák, T.: IoT measuring of UDP-based distributed reflective DoS attack. In: 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), pp. 000209–000214. IEEE, September 2018
Pajila, P.B., Julie, E.G.: Detection of DDoS attack using SDN in IoT: a survey. In: Intelligent Communication Technologies and Virtual Mobile Networks, pp. 438–452. Springer, Cham (2019)
Kambourakis, G., Kolias, C., Stavrou, A.: The mirai botnet and the IoT zombie armies. In: MILCOM 2017–2017 IEEE Military Communications Conference (MILCOM), pp. 267–272. IEEE (2017)
Acknowledgement
The research was fully supported by the Centre of Graduate Studies (CGS). The authors fully acknowledge the Universiti Teknologi PETRONAS (UTP) for financial support, which has made this research possible.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Aminu Ghali, A., Ahmad, R., Alhussian, H.S.A. (2020). Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment. In: Silhavy, R. (eds) Artificial Intelligence and Bioinspired Computational Methods. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1225. Springer, Cham. https://doi.org/10.1007/978-3-030-51971-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-51971-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51970-4
Online ISBN: 978-3-030-51971-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)