Design and Development of IOT Testbed with DDoS Attack for Cyber Security Research

被引:12
|
作者
Arthi, R. [1 ]
Krishnaveni, S. [2 ]
机构
[1] SRM IST, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM IST, Dept Software Engn, Chennai, Tamil Nadu, India
关键词
IOT; DDOS; DNS Attack; Testbed for IOT;
D O I
10.1109/ICSPC51351.2021.9451786
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) is clubbed by networking of sensors and other embedded electronics. As more devices are getting connected, the vulnerability of getting affected by various IoT threats also increases. Among the IoT threads, DDoS attacks are causing serious issues in recent years. In IoT, these attacks are challenging to detect and isolate. Thus, an effective Intrusion Detection System (IDS) is essential to defend against these attacks. The traditional IDS is based on manual blacklisting. These methods are time-consuming and will not be effective to detect novel intrusions. At present, IDS are automated and programmed to be dynamic which are aided by machine learning & deep learning models. The performance of these models mainly depends on the data used to train the model. Majority of IDS study is performed with non-compatible and outdated datasets like KDD 99 and NSL KDD. Research on specific DDoS attack datasets is very less. Therefore, in this paper, we first aim to examine the effect of existing datasets in the IoT environment. Then, we propose a real-time data collection framework for DNS amplification attacks in IoT. The generated network packets containing DDoS attack is captured through port mirroring.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 50 条
  • [1] Cyber Security Risk Assessment of a DDoS Attack
    Wangen, Gaute
    Shalaginov, Andrii
    Hallstensen, Christoffer
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 183 - 202
  • [2] DESIGN AND IMPLEMENTATION OF DDOS ATTACK AND DEFENSE TESTBED
    Ning, Song
    Han, Qiu
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 220 - 223
  • [3] SCADA cyber security testbed development
    Davis, C. M.
    Tate, J. E.
    Okhravi, H.
    Grier, C.
    Overbye, T. J.
    Nicol, D.
    2006 38TH ANNUAL NORTH AMERICAN POWER SYMPOSIUM, NAPS-2006 PROCEEDINGS, 2006, : 483 - +
  • [4] Development of Cyber Security Testbed for Critical Infrastructure
    Jarmakiewicz, Jacek
    Maslanka, Krzysztof
    Parobczak, Krzysztof
    2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [5] Design and implementation of automated IoT security testbed
    Abu Waraga, Omnia
    Bettayeb, Meriem
    Nasir, Qassim
    Abu Talib, Manar
    COMPUTERS & SECURITY, 2020, 88 (88)
  • [6] Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education
    Frank, Maximilian
    Leitner, Maria
    Pahi, Timea
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 38 - 46
  • [7] The Research on Cyber-Attack Testbed With Hardware-In-Loop
    Fei, Jiaxuan
    Liu, Zengji
    Ma, Yuanyuan
    Huang, Xiuli
    Wang, Qi
    Tang, Yi
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [8] A Cyber-Physical Testbed for IoT Microgrid Design and Validation
    Lee, Yih-Shiuan
    Wang, Chao
    ELECTRONICS, 2024, 13 (07)
  • [9] Development of testbed for cyber-manufacturing security issues
    Wu, Mingtao
    Song, Jinwoo
    Sharma, Snehav
    Di, Jupeng
    He, Benliu
    Wang, Ziming
    Zhang, Jingkai
    Lin, Long Wang Lucas
    Greaney, Emily Ann
    Moon, Young
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2020, 33 (03) : 302 - 320
  • [10] Research on DDoS Attack Detection Based on ELM in IoT Environment
    Li, Zhihui
    Wei, Lihong
    Li, Wei
    Wei, Lai
    Chen, Minshi
    Lv, Ming
    Zhi, Xulong
    Wang, Chenguang
    Gao, Nan
    PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 144 - 148