ABSTRACT
The Internet of Things (IoT) vulnerabilities provides an ideal target for botnets, making them a major contributor in the increased number of Distributed Denial of Service (DDoS) attacks. The increase in DDoS attacks has made it important to address the consequences it implies on the IoT industry being one of the major causes. The aim of this paper is to provide an analysis of the attempts to prevent DDoS attacks, mainly at a network level. The sensibility of these solutions is extracted from their impact in resolving IoT vulnerabilities. It is evident from this review that there is no perfect solution yet for IoT security, this field still has many opportunities for research and development.
- M Ejaz Ahmed and Hyoungshick Kim. 2017. DDoS Attack Mitigation in Internet of Things Using Software Defined Networking. In Big Data Computing Service and Applications (BigDataService), IEEE Third International Conference on. IEEE, 271--276.Google Scholar
- Yahya Atwady and Mohammed Hammoudeh. 2017. A Survey on Authentication Techniques for the Internet of Things. In Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS '17). ACM, Article 8. Google ScholarDigital Library
- Ali Benzerbadj, Bouabdellah Kechar, Ahcne Bounceur, and Mohammad Hammoudeh. 2018. Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. Journal of Network and Computer Applications 112 (2018), 41 -- 52. DOI: http://dx.doi.org/ Google ScholarDigital Library
- Elisa Bertino and Nayeem Islam. 2017. Botnets and internet of things security. Computer 50, 2 (2017), 76--79. Google ScholarDigital Library
- Nikos Bizanis and Fernando A Kuipers. 2016. SDN and virtualization solutions for the Internet of Things: A survey. IEEE Access 4 (2016), 5591--5606.Google ScholarCross Ref
- R. Braga, E. Mota, and A. Passito. 2010. Lightweight DDoS flooding attack detection using NOX/OpenFlow. In IEEE Local Computer Network Conference. 408--415. DOI: htp:// Google ScholarDigital Library
- Andrew Carlin, Mohammad Hammoudeh, and Omar Aldabbas. 2015. Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. International Journal of Advanced Computer Science and Applications 6, 6 (2015).Google ScholarCross Ref
- Jisa David and Ciza Thomas. 2015. DDoS attack detection using fast entropy approach on flow-based network traffic. Procedia Computer Science 50 (2015), 30--36.Google ScholarCross Ref
- Suzanne Deffree. 2017 (accessed March 9, 2017). TR-PANET establishes 1st computer-to-computer link. https://www.edn.com/electronics-blogs/edn-moments/4399541/ARPANET-establishes-1st-computer-to-computer-link-October-29-1969. (2017 (accessed March 9, 2017)).Google Scholar
- Jyoti Deogirikar and Amarsinh Vidhate. 2017. Security attacks in IoT: A survey. In I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on. IEEE, 32--37.Google Scholar
- Dave Evans. 2011. The internet of things: How the next evolution of the internet is changing everything. CISCO white paper 1, 2011 (2011), 1--11.Google Scholar
- Muhammad Farhan, Sohail Jabbar, Muhammad Aslam, Mohammad Hammoudeh, Mudassar Ahmad, Shehzad Khalid, Murad Khan, and Kijun Han. 2018. IoT-based students interaction framework using attention-scoring assessment in eLearning. Future Generation Computer Systems 79 (2018), 909 -- 919. DOI: http://dx.doi.org/ Google ScholarDigital Library
- Ibrahim Ghafir, Vaclav Prenosil, and Mohammad Hammoudeh. 2016. Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution. (2016).Google Scholar
- Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, and Umar Raza. 2017. Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. In Proceedings of the International Conference on Future Networks and Distributed Systems (ICFNDS '17). ACM, New York, NY, USA, Article 27. Google ScholarDigital Library
- Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar Jaf, Sohail Jabbar, and Thar Baker. 2018. Security threats to critical infrastructure: the human factor. The Journal of Supercomputing (26 Mar 2018). DOI: htp://Google Scholar
- Waylon Grange. 2017. Hajime worm battles Mirai for control of the Internet of Things. Symantec Blog, April (2017).Google Scholar
- Mohammad Hammoudeh and Mounir Arioua. 2018. Sensors and Actuators in Smart Cities. Journal of Sensor and Actuator Networks 7, 1 (2018).Google ScholarCross Ref
- Yaser Jararweh, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Mladen Vouk, Andy Rindos, and others. 2015. SDIoT: a software defined based internet of things framework. Journal of Ambient Intelligence and Humanized Computing 6, 4 (2015), 453--461.Google ScholarCross Ref
- Olamide Jogunola, Augustine Ikpehai, Kelvin Anoh, Bamidele Adebisi, Mohammad Hammoudeh, Haris Gacanin, and Georgina Harris. 2018. Comparative Analysis of P2P Architectures for Energy Trading and Sharing. Energies 11, 1 (2018).Google Scholar
- Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets. Computer 50, 7 (2017), 80--84.Google ScholarDigital Library
- Reema Kumari and Kavita Sharma. 2018. Cross-Layer Based Intrusion Detection and Prevention for Network. In Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, 38--56.Google Scholar
- Jie Li, Eitan Altman, and Corinne Touati. 2015. A general SDN-based IoT framework with NVF implementation. ZTE communications 13, 3 (2015), 42--45.Google Scholar
- Björn Lundgren and Niklas Möller. 2017. Defining Information Security. Science and Engineering Ethics (15 Nov 2017). DOI: htp://Google Scholar
- Giseop No and Ilkyeun Ra. 2009. An efficient and reliable DDoS attack detection using a fast entropy computation method. In Communications and Information Technology. 9th International Symposium on. IEEE, 1223--1228. Google ScholarDigital Library
- Mike Ojo, Davide Adami, and Stefano Giordano. 2016. A sdn-iot architecture with nfv implementation. In Globecom Workshops (GC Wkshps), IEEE. IEEE, 1--6.Google ScholarCross Ref
- Charlie Osborne. 2017 (accessed December 9, 2017). The average DDoS attack cost for businesses rises to over $2.5 million. http://www.zdnet.com/article/the-average-ddos-attack-cost-for-businesses-rises-to-over-2-5m. (2017 (accessed December 9, 2017)).Google Scholar
- Radware. 2017 (accessed April 7, 2018). 2017's 5 Most Dangerous DDoS Attacks and Steps to Mitigate Them. https://security.radware.com/. (2017 (accessed April 7, 2018)).Google Scholar
- Radware. 2017 (accessed April 7, 2018). "BrickerBot" Results In PDoS Attack. https://security.radware.com/ddos-threats-attacks/brickerbot-pdos-permanent-denial-of-service/. (2017 (accessed April 7, 2018)).Google Scholar
- Radware. 2017 (accessed Jan 9, 2018). DDoS Handbook: The ultimate guide to everything you need to know about DDoS attacks. https://security.radware.com/uploadedfiles/resources_and_content/ddos_handbook/ddos_handbook.pdf. (2017 (accessed Jan 9, 2018)).Google Scholar
- Bahman Rashidi, Carol Fung, and Elisa Bertino. 2017. A collaborative ddos defence framework using network function virtualization. IEEE Transactions on Information Forensics and Security 12, 10 (2017), 2483--2497.Google ScholarDigital Library
- Alison DeNisco Rayome. 2017 (accessed April 9, 2018). 33% of businesses hit by DDoS attack in 2017, double that of 2016. https://www.techrepublic.com/article/33-of-businesses-hit-by-ddos-attack-in-2017-double-that-of-2016. (2017 (accessed April 9, 2018)).Google Scholar
- Adil Fahad Alharthi Deris Stiawan, Mohammed Yahya Alzahrani Muhammad Fermi Pasha, and Ismat Aldmour Rahmat Budiarto. 2017. Smart Real-Time Internet-of-Things Network Monitoring System. Powering the Internet of Things With 5G Networks (2017), 202.Google Scholar
- S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha. 2018. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access (2018), 1--1.Google Scholar
Index Terms
- DDoS attacks on the internet of things and their prevention methods
Recommendations
Mitigating loT Device based DDoS Attacks using Blockchain
CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed SystemsMany IoT devices lack memory and computational complexities of modern computing devices, making them vulnerable to a wide range of cyber attacks. Among these, DDoS attacks are a growing concern in IoT. Such attacks are executed through the introduction ...
Internet of Things: information security challenges and solutions
Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in dynamic and complicated cyberspace, and take them into account while developing holistic information security (IS) approaches for ...
Distributed Denial-of-Service Attack Detection and Mitigation for the Internet of Things
The Internet of Things (IoT) allows different devices with internet protocol (IP) address to be connected together via the internet to collect, provide, store, and exchange data amongst themselves. The distributed denial of service (DDoS) attack is ...
Comments