Design and Development of IOT Testbed with DDoS Attack for Cyber Security Research

被引:12
|
作者
Arthi, R. [1 ]
Krishnaveni, S. [2 ]
机构
[1] SRM IST, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM IST, Dept Software Engn, Chennai, Tamil Nadu, India
关键词
IOT; DDOS; DNS Attack; Testbed for IOT;
D O I
10.1109/ICSPC51351.2021.9451786
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) is clubbed by networking of sensors and other embedded electronics. As more devices are getting connected, the vulnerability of getting affected by various IoT threats also increases. Among the IoT threads, DDoS attacks are causing serious issues in recent years. In IoT, these attacks are challenging to detect and isolate. Thus, an effective Intrusion Detection System (IDS) is essential to defend against these attacks. The traditional IDS is based on manual blacklisting. These methods are time-consuming and will not be effective to detect novel intrusions. At present, IDS are automated and programmed to be dynamic which are aided by machine learning & deep learning models. The performance of these models mainly depends on the data used to train the model. Majority of IDS study is performed with non-compatible and outdated datasets like KDD 99 and NSL KDD. Research on specific DDoS attack datasets is very less. Therefore, in this paper, we first aim to examine the effect of existing datasets in the IoT environment. Then, we propose a real-time data collection framework for DNS amplification attacks in IoT. The generated network packets containing DDoS attack is captured through port mirroring.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 50 条
  • [31] Development of Network Cyber Attack Training Curriculum for Security Staff
    Kim, Guk-Il
    Kim, Jonghyeon
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 210 - 214
  • [32] DESIGN AND IMPLEMENTATION OF A DEVS- BASED CYBER-ATTACK SIMULATOR FOR CYBER SECURITY
    Kara, S.
    Hizal, S.
    Zengin, A.
    INTERNATIONAL JOURNAL OF SIMULATION MODELLING, 2022, 21 (01) : 53 - 64
  • [33] Development Approach to the Attack Modeling for the Needs of Cyber Security Education
    Ivanc, Blaz
    Blazic, Borka Jerman
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 216 - 220
  • [34] A Testbed for SCADA Cyber Security and Intrusion Detection
    Singh, Prateek
    Garg, Saurabh
    Kumar, Vinod
    Saquib, Zia
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [35] Development of Cyber-Physical Security Testbed Based on IEC 61850 Architecture
    Blazek, Petr
    Fujdiak, Radek
    Mlynek, Petr
    Misurec, Jiri
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2019, 25 (05) : 82 - 87
  • [36] DDOSHIELD-IoT: A Testbed for Simulating and Lightweight Detection of IoT Botnet DDoS Attacks
    De Vivo, Simona
    Obaidat, Islam
    Dai, Dong
    Liguori, Pietro
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W 2024, 2024, : 1 - 8
  • [37] Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks
    Snehi, Manish
    Bhandari, Abhinav
    COMPUTER SCIENCE REVIEW, 2021, 40
  • [38] Challenges in the Design of an IoT Testbed
    Sasirekha, G. V. K.
    Adhisaya, T.
    Aswini, P.
    Bapat, Jyotsna
    Das, Debabrata
    2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 14 - 19
  • [39] Design of a Smart Desk for an IoT Testbed: Improving Learning Efficiency and System Security
    Yamada, Masafumi
    Cuka, Miralda
    Liu, Yi
    Oda, Tetsuya
    Matsuo, Keita
    Barolli, Leonard
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 27 - 35
  • [40] DDoS in IoT: A Roadmap Towards Security & Countermeasures
    Roohi, Ammara
    Adeel, Muhammad
    Shah, Munam Ali
    2019 25TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2019, : 273 - 278