A survey of DDoS attacking techniques and defence mechanisms in the IoT network

被引:151
|
作者
Vishwakarma, Ruchi [1 ]
Jain, Ankit Kumar [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Kurukshetra, Haryana, India
关键词
IoT; DDoS; Botnet; Malware detection; Machine learning; INTERNET; THINGS; FUTURE; PROTECTION;
D O I
10.1007/s11235-019-00599-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by interacting with numerous smart applications running independently on different platforms, almost everywhere in the world. IoT, with such a ubiquitous popularity often serve itself as a potential platform for escalating malicious entities. These entities get an access to the legitimate devices by exploiting IoT vulnerabilities which results from several constraints like limited resources, weaker security, etc. and can further take form of various attacks. Distributed Denial-of-service (DDoS) in IoT network is an attack which targets the availability of the servers by flooding the communication channel with impersonated requests coming from distributed IoT devices. Defending DDoS in IoT has now become an exigent area of research due to the recent incidents of demolishment of some renowned servers, reported in previous few years. In this paper, we discuss the concept of malware and botnets working behind 'Distributed' DoS in IoT. The various DDoS defence techniques are broadly described and compared in order to identify the security gaps present in them. Moreover, we list out the open research issues and challenges that need to be addressed for a stronger as well as smarter DDoS defence.
引用
收藏
页码:3 / 25
页数:23
相关论文
共 50 条
  • [21] A comprehensive study of DDoS attacks over IoT network and their countermeasures
    Kumari, Pooja
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2023, 127
  • [22] Survey on Recent DDoS Mitigation Techniques and Comparative Analysis
    Rai, Ankur
    Challa, Rama Krishna
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 96 - 101
  • [23] A Survey on IOT Issues and Data Analysis Techniques to Increase Life of Wireless Network
    Khara, Satvik
    Saxena, Amitabh
    Sinha, Sitesh Kumar
    Gupta, Sanjeev Kumar
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 176 - 182
  • [24] Network Security for IoT using SDN: Timely DDoS Detection
    Sambandam, Narmadha
    Hussein, Mourad
    Siddiqi, Noor
    Lung, Chung-Horng
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 159 - 160
  • [25] Classification of IoT based DDoS Attack using Machine Learning Techniques
    Fasih, Muhammad Ashfaq
    Maryam, Malik
    Urooj, Fatima
    Shahzad, Muhammad Khuram
    PROCEEDINGS OF THE 2022 16TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2022), 2022,
  • [26] DDoS Attack Detection on IoT Devices Using Machine Learning Techniques
    Kumar, Sunil
    Sahu, Rohit Kumar
    Rudra, Bhawana
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA 2021, 2022, 418 : 787 - 794
  • [27] A Transformer and Federated Learning Techniques for Detecting DDoS Attacks in IoT Environments
    Aleyead, Saud
    Al-Ahmadi, Saad
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2024, VOL 3, 2024, 1013 : 1 - 17
  • [28] A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems
    Wehbi, Khadijeh
    Hong, Liang
    Al-salah, Tulha
    Bhutta, Adeel A.
    2019 IEEE SOUTHEASTCON, 2019,
  • [29] Network softwarization for IoT: A Survey
    Shamsan, Ali Haider
    Faridi, Arman Rasool
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1163 - 1168
  • [30] IoT data cleaning techniques: A survey
    Ding X.
    Wang H.
    Li G.
    Li H.
    Li Y.
    Liu Y.
    Intelligent and Converged Networks, 2022, 3 (04): : 325 - 339