Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks

被引:0
|
作者
Anirudh, M. [1 ]
Thileeban, Arul S. [1 ]
Nallathambi, Daniel Jeswin [1 ]
机构
[1] SSN Coll Engn, Dept Comp Sci & Engn, Kancheepuram, Tamil Nadu, India
关键词
Internet of Things; Denial of Service; Honeypot; IoT Security; Security breach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Every day, a new technology comes up and the primary reason why it fails to attract many people in this era is the concern of privacy and security. Each day, along with the new technology comes a load of vulnerabilities waiting to be exploited. IoT (Internet of Things) is the latest trend and like all technology, it is open for exploitation. The most common attack which is used to bring down a whole network, without even finding a loophole in the security-DoS can be used to pull down any IoT network as well. In this paper, we propose a honeypot model for mitigating DoS attacks launched on IoT devices. Honeypots are commonly used in online servers as a decoy to the main server so that the attack is mitigated to the decoy instead of the main server. Here a similar methodology is used to avoid the whole IoT system from being shut down due to a DoS attack.
引用
收藏
页码:11 / 14
页数:4
相关论文
共 50 条
  • [41] Mitigating DoS Attacks against SDN Controller Using Information Hiding
    Abdullaziz, Osamah Ibrahiem
    Wang, Li-Chun
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [42] DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
    Simsek, Goksel
    Bostan, Hakan
    Sarica, Alper Kaan
    Sarikaya, Egemen
    Keles, Alperen
    Angin, Pelin
    Alemdar, Hande
    Onur, Ertan
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 55 - 66
  • [43] Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
    Arnaboldi, Luca
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 224 - 233
  • [44] Detailed DoS attacks in wireless networks and countermeasures
    Mohammed, Lawan A.
    Issac, Biju
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 157 - 166
  • [45] Exception Triggered DoS Attacks on Wireless Networks
    Zhao, Yao
    Vemuri, Sagar
    Chen, Jiazhen
    Chen, Yan
    Zhou, Hai
    Fu, Zhi
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 13 - +
  • [46] Preemptive DoS attacks on Time Sensitive Networks
    Buelbuel, Nurefsan Sertbas
    Fischer, Mathias
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 4289 - 4294
  • [47] Controlling and Mitigating Targeted Socio-Economic Attacks
    Kumar, Prabhat
    Dasari, Yashwanth
    Nath, Shubhangee
    Sinha, Akash
    SOCIAL MEDIA: THE GOOD, THE BAD, AND THE UGLY, 2016, 9844 : 471 - 476
  • [48] Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
    Anthi, Eirini
    Williams, Lowri
    Laved, Amir
    Burnap, Pete
    COMPUTERS & SECURITY, 2021, 108
  • [49] Mitigating Blackhole Attacks in Delay Tolerant Networks
    Al Hinai, Aysha
    Zhang, Haibo
    Chen, Yawen
    2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 329 - 334
  • [50] Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT
    Arnaboldi, Luca
    Morisset, Charles
    SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS, 2018, 11176 : 130 - 145