Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks

被引:0
|
作者
Anirudh, M. [1 ]
Thileeban, Arul S. [1 ]
Nallathambi, Daniel Jeswin [1 ]
机构
[1] SSN Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Internet of Things; Denial of Service; Honeypot; IoT Security; Security breach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Every day, a new technology comes up and the primary reason why it fails to attract many people in this era is the concern of privacy and security. Each day, along with the new technology comes a load of vulnerabilities waiting to be exploited. IoT (Internet of Things) is the latest trend and like all technology, it is open for exploitation. The most common attack which is used to bring down a whole network, without even finding a loophole in the security-DoS can be used to pull down any IoT network as well. In this paper, we propose a honeypot model for mitigating DoS attacks launched on IoT devices. Honeypots are commonly used in online servers as a decoy to the main server so that the attack is mitigated to the decoy instead of the main server. Here a similar methodology is used to avoid the whole IoT system from being shut down due to a DoS attack.
引用
收藏
页码:11 / 14
页数:4
相关论文
共 50 条
  • [21] A Game Theoretic Model for Enabling Honeypots in IoT Networks
    La, Quang Duy
    Quek, Tony Q. S.
    Lee, Jemin
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [22] Roaming honeypots for mitigating service-level denial-of-service attacks
    Khattab, SM
    Sangpachatanaruk, C
    Mossé, D
    Melhem, R
    Znati, T
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 328 - 337
  • [23] Mitigating Resource-draining DoS attacks on Broadcast Source Authentication on Wireless Sensors Networks
    Bekara, Chakib
    Laurent-Maknavicius, Maryline
    Bekara, Kheira
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 109 - 116
  • [24] Mitigating Adversarial Attacks against IoT Profiling
    Neto, Euclides Carlos Pinto
    Dadkhah, Sajjad
    Sadeghi, Somayeh
    Molyneaux, Heather
    ELECTRONICS, 2024, 13 (13)
  • [25] Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
    Paradise A.
    Shabtai A.
    Puzis R.
    Elyashar A.
    Elovici Y.
    Roshandel M.
    Peylo C.
    Paradise, Abigail (abigailp@post.bgu.ac.il), 1600, Institute of Electrical and Electronics Engineers Inc., United States (04): : 65 - 79
  • [26] Mitigating congestion based DoS attacks with an enhanced AQM technique
    Bedi, Harkeerat
    Roy, Sankardas
    Shiva, Sajjan
    COMPUTER COMMUNICATIONS, 2015, 56 : 60 - 73
  • [27] Mitigating DoS Attacks in SDN Using Offloading Path Strategies
    Huang, Tai-Siang
    Hsiung, Po-Yang
    Cheng, Bo-Chao
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1281 - 1285
  • [28] Mitigating Dynamic DoS Attacks in Mobile Ad Hoc Network
    Joshi, Bhavin
    Singh, Nikhil Kumar
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [29] Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
    Altulaihan, Esra
    Almaiah, Mohammed Amin
    Aljughaiman, Ahmed
    SENSORS, 2024, 24 (02)
  • [30] Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks
    Rausch, Michael J.
    Krishna, Varun Badrinath
    Gu, Peng
    Chandra, Rupak
    Feddersen, Brett
    Fawaz, Ahmed
    Sanders, William H.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2018,