Reference Hub2
Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications

Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications

Manimaran Aridoss
Copyright: © 2017 |Volume: 8 |Issue: 4 |Pages: 12
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781522513445|DOI: 10.4018/IJHCR.2017100104
Cite Article Cite Article

MLA

Aridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." IJHCR vol.8, no.4 2017: pp.40-51. http://doi.org/10.4018/IJHCR.2017100104

APA

Aridoss, M. (2017). Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications. International Journal of Handheld Computing Research (IJHCR), 8(4), 40-51. http://doi.org/10.4018/IJHCR.2017100104

Chicago

Aridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications," International Journal of Handheld Computing Research (IJHCR) 8, no.4: 40-51. http://doi.org/10.4018/IJHCR.2017100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed Denial of Service attacks to degrade cloud server performance. Attack detection techniques are applied to the VMs that are used by malicious tenants to hold the cloud resources by launching DDoS attacks at data center subnets. Traditional dataflow-based attack detection methods rely on the similarities of incoming requests which consist of IP and TCP header information flows. The proposed approach classifies the status patterns of malicious VMs and ideal VMs to identify the attackers. In this article, information theory is used to calculate the entropy value of the malicious virtual machines for detecting attack behaviors. Experimental results prove that the proposed system works well against DDoS attacks in IoT applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.