skip to main content
10.1145/3231053.3231057acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

DDoS attacks on the internet of things and their prevention methods

Published:26 June 2018Publication History

ABSTRACT

The Internet of Things (IoT) vulnerabilities provides an ideal target for botnets, making them a major contributor in the increased number of Distributed Denial of Service (DDoS) attacks. The increase in DDoS attacks has made it important to address the consequences it implies on the IoT industry being one of the major causes. The aim of this paper is to provide an analysis of the attempts to prevent DDoS attacks, mainly at a network level. The sensibility of these solutions is extracted from their impact in resolving IoT vulnerabilities. It is evident from this review that there is no perfect solution yet for IoT security, this field still has many opportunities for research and development.

References

  1. M Ejaz Ahmed and Hyoungshick Kim. 2017. DDoS Attack Mitigation in Internet of Things Using Software Defined Networking. In Big Data Computing Service and Applications (BigDataService), IEEE Third International Conference on. IEEE, 271--276.Google ScholarGoogle Scholar
  2. Yahya Atwady and Mohammed Hammoudeh. 2017. A Survey on Authentication Techniques for the Internet of Things. In Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS '17). ACM, Article 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ali Benzerbadj, Bouabdellah Kechar, Ahcne Bounceur, and Mohammad Hammoudeh. 2018. Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. Journal of Network and Computer Applications 112 (2018), 41 -- 52. DOI: http://dx.doi.org/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Elisa Bertino and Nayeem Islam. 2017. Botnets and internet of things security. Computer 50, 2 (2017), 76--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Nikos Bizanis and Fernando A Kuipers. 2016. SDN and virtualization solutions for the Internet of Things: A survey. IEEE Access 4 (2016), 5591--5606.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. Braga, E. Mota, and A. Passito. 2010. Lightweight DDoS flooding attack detection using NOX/OpenFlow. In IEEE Local Computer Network Conference. 408--415. DOI: htp:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Andrew Carlin, Mohammad Hammoudeh, and Omar Aldabbas. 2015. Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. International Journal of Advanced Computer Science and Applications 6, 6 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  8. Jisa David and Ciza Thomas. 2015. DDoS attack detection using fast entropy approach on flow-based network traffic. Procedia Computer Science 50 (2015), 30--36.Google ScholarGoogle ScholarCross RefCross Ref
  9. Suzanne Deffree. 2017 (accessed March 9, 2017). TR-PANET establishes 1st computer-to-computer link. https://www.edn.com/electronics-blogs/edn-moments/4399541/ARPANET-establishes-1st-computer-to-computer-link-October-29-1969. (2017 (accessed March 9, 2017)).Google ScholarGoogle Scholar
  10. Jyoti Deogirikar and Amarsinh Vidhate. 2017. Security attacks in IoT: A survey. In I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on. IEEE, 32--37.Google ScholarGoogle Scholar
  11. Dave Evans. 2011. The internet of things: How the next evolution of the internet is changing everything. CISCO white paper 1, 2011 (2011), 1--11.Google ScholarGoogle Scholar
  12. Muhammad Farhan, Sohail Jabbar, Muhammad Aslam, Mohammad Hammoudeh, Mudassar Ahmad, Shehzad Khalid, Murad Khan, and Kijun Han. 2018. IoT-based students interaction framework using attention-scoring assessment in eLearning. Future Generation Computer Systems 79 (2018), 909 -- 919. DOI: http://dx.doi.org/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ibrahim Ghafir, Vaclav Prenosil, and Mohammad Hammoudeh. 2016. Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution. (2016).Google ScholarGoogle Scholar
  14. Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, and Umar Raza. 2017. Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. In Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS '17). ACM, New York, NY, USA, Article 27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar Jaf, Sohail Jabbar, and Thar Baker. 2018. Security threats to critical infrastructure: the human factor. The Journal of Supercomputing (26 Mar 2018). DOI: htp://Google ScholarGoogle Scholar
  16. Waylon Grange. 2017. Hajime worm battles Mirai for control of the Internet of Things. Symantec Blog, April (2017).Google ScholarGoogle Scholar
  17. Mohammad Hammoudeh and Mounir Arioua. 2018. Sensors and Actuators in Smart Cities. Journal of Sensor and Actuator Networks 7, 1 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  18. Yaser Jararweh, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Mladen Vouk, Andy Rindos, and others. 2015. SDIoT: a software defined based internet of things framework. Journal of Ambient Intelligence and Humanized Computing 6, 4 (2015), 453--461.Google ScholarGoogle ScholarCross RefCross Ref
  19. Olamide Jogunola, Augustine Ikpehai, Kelvin Anoh, Bamidele Adebisi, Mohammad Hammoudeh, Haris Gacanin, and Georgina Harris. 2018. Comparative Analysis of P2P Architectures for Energy Trading and Sharing. Energies 11, 1 (2018).Google ScholarGoogle Scholar
  20. Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets. Computer 50, 7 (2017), 80--84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Reema Kumari and Kavita Sharma. 2018. Cross-Layer Based Intrusion Detection and Prevention for Network. In Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, 38--56.Google ScholarGoogle Scholar
  22. Jie Li, Eitan Altman, and Corinne Touati. 2015. A general SDN-based IoT framework with NVF implementation. ZTE communications 13, 3 (2015), 42--45.Google ScholarGoogle Scholar
  23. Björn Lundgren and Niklas Möller. 2017. Defining Information Security. Science and Engineering Ethics (15 Nov 2017). DOI: htp://Google ScholarGoogle Scholar
  24. Giseop No and Ilkyeun Ra. 2009. An efficient and reliable DDoS attack detection using a fast entropy computation method. In Communications and Information Technology. 9th International Symposium on. IEEE, 1223--1228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Mike Ojo, Davide Adami, and Stefano Giordano. 2016. A sdn-iot architecture with nfv implementation. In Globecom Workshops (GC Wkshps), IEEE. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  26. Charlie Osborne. 2017 (accessed December 9, 2017). The average DDoS attack cost for businesses rises to over $2.5 million. http://www.zdnet.com/article/the-average-ddos-attack-cost-for-businesses-rises-to-over-2-5m. (2017 (accessed December 9, 2017)).Google ScholarGoogle Scholar
  27. Radware. 2017 (accessed April 7, 2018). 2017's 5 Most Dangerous DDoS Attacks and Steps to Mitigate Them. https://security.radware.com/. (2017 (accessed April 7, 2018)).Google ScholarGoogle Scholar
  28. Radware. 2017 (accessed April 7, 2018). "BrickerBot" Results In PDoS Attack. https://security.radware.com/ddos-threats-attacks/brickerbot-pdos-permanent-denial-of-service/. (2017 (accessed April 7, 2018)).Google ScholarGoogle Scholar
  29. Radware. 2017 (accessed Jan 9, 2018). DDoS Handbook: The ultimate guide to everything you need to know about DDoS attacks. https://security.radware.com/uploadedfiles/resources_and_content/ddos_handbook/ddos_handbook.pdf. (2017 (accessed Jan 9, 2018)).Google ScholarGoogle Scholar
  30. Bahman Rashidi, Carol Fung, and Elisa Bertino. 2017. A collaborative ddos defence framework using network function virtualization. IEEE Transactions on Information Forensics and Security 12, 10 (2017), 2483--2497.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Alison DeNisco Rayome. 2017 (accessed April 9, 2018). 33% of businesses hit by DDoS attack in 2017, double that of 2016. https://www.techrepublic.com/article/33-of-businesses-hit-by-ddos-attack-in-2017-double-that-of-2016. (2017 (accessed April 9, 2018)).Google ScholarGoogle Scholar
  32. Adil Fahad Alharthi Deris Stiawan, Mohammed Yahya Alzahrani Muhammad Fermi Pasha, and Ismat Aldmour Rahmat Budiarto. 2017. Smart Real-Time Internet-of-Things Network Monitoring System. Powering the Internet of Things With 5G Networks (2017), 202.Google ScholarGoogle Scholar
  33. S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha. 2018. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access (2018), 1--1.Google ScholarGoogle Scholar

Index Terms

  1. DDoS attacks on the internet of things and their prevention methods

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader