scholarly journals A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach

Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1282
Author(s):  
Abdulrahman Aminu Ghali ◽  
Rohiza Ahmad ◽  
Hitham Alhussian

The Internet of Things (IoT) has gained remarkable acceptance from millions of individuals. This is evident in the extensive use of intelligent devices such as smartphones, smart television, speakers, air conditioning, lighting, and high-speed networks. The general application area of IoT includes industries, hospitals, schools, homes, sports, oil and gas, automobile, and entertainment, to mention a few. However, because of the unbounded connection of IoT devices and the lack of a specific method for overseeing communication, security concerns such as distributed denial of service (DDoS), denial of service (DoS), replay, botnet, social engineering, man-in-the-middle, and brute force attacks have posed enormous challenges in the IoT environment. Regarding these enormous challenges, this study focuses on DDoS and DoS attacks. These two attacks have the most severe consequences in the IoT environment. The solution proposed in this study can also help future researchers tackle the expansion of IoT security threats. Moreover, the study conducts rigorous experiments to assess the efficiency of the proposed approach. In summary, the experimental results show that the proposed hybrid approach mitigates data exfiltration caused by DDoS and DoS attacks by 95.4%, with average network lifetime, energy consumption, and throughput improvements of 15%, 25%, and 60%, respectively.

2021 ◽  
Author(s):  
Eduardo De Oliveira Burger Monteiro Luiz ◽  
Alessandro Copetti ◽  
Luciano Bertini ◽  
Juliano Fontoura Kazienko

The introduction of the IPv6 protocol solved the problem of providingaddresses to network devices. With the emergence of the Internetof Things (IoT), there was also the need to develop a protocolthat would assist in connecting low-power devices. The 6LoWPANprotocols were created for this purpose. However, such protocolsinherited the vulnerabilities and threats related to Denial of Service(DoS) attacks from the IPv4 and IPv6 protocols. In this paper, weprepare a network environment for low-power IoT devices usingCOOJA simulator and Contiki operating system to analyze theenergy consumption of devices. Besides, we propose an IntrusionDetection System (IDS) associated with the AES symmetric encryptionalgorithm for the detection of reflection DoS attacks. Thesymmetric encryption has proven to be an appropriate methoddue to low implementation overhead, not incurring in large powerconsumption, and keeping a high level of system security. The maincontributions of this paper are: (i) implementation of a reflectionattack algorithm for IoT devices; (ii) implementation of an intrusiondetection system using AES encryption; (iii) comparison ofthe power consumption in three distinct scenarios: normal messageexchange, the occurrence of a reflection attack, and runningIDS algorithm. Finally, the results presented show that the IDSwith symmetric cryptography meets the security requirements andrespects the energy limits of low-power sensors.


2017 ◽  
Author(s):  
Michele De Donno ◽  
Nicola Dragoni ◽  
Alberto Giaretta ◽  
Manuel Mazzara

The 2016 is remembered as the year that showed to the world how dangerous distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DoS attacks perpetrated through IoT devices.


Information ◽  
2020 ◽  
Vol 11 (5) ◽  
pp. 279 ◽  
Author(s):  
Bambang Susilo ◽  
Riri Fitri Sari

The internet has become an inseparable part of human life, and the number of devices connected to the internet is increasing sharply. In particular, Internet of Things (IoT) devices have become a part of everyday human life. However, some challenges are increasing, and their solutions are not well defined. More and more challenges related to technology security concerning the IoT are arising. Many methods have been developed to secure IoT networks, but many more can still be developed. One proposed way to improve IoT security is to use machine learning. This research discusses several machine-learning and deep-learning strategies, as well as standard datasets for improving the security performance of the IoT. We developed an algorithm for detecting denial-of-service (DoS) attacks using a deep-learning algorithm. This research used the Python programming language with packages such as scikit-learn, Tensorflow, and Seaborn. We found that a deep-learning model could increase accuracy so that the mitigation of attacks that occur on an IoT network is as effective as possible.


Energies ◽  
2021 ◽  
Vol 14 (15) ◽  
pp. 4702
Author(s):  
Karolina Krzykowska-Piotrowska ◽  
Ewa Dudek ◽  
Mirosław Siergiejczyk ◽  
Adam Rosiński ◽  
Wojciech Wawrzyński

The increase in the role of companion robots in everyday life is inevitable, and their safe communication with the infrastructure is one of the fundamental challenges faced by designers. There are many challenges in the robot’s communication with the environment, widely described in the literature on the subject. The threats that scientists believe have the most significant impact on the robot’s communication include denial-of-service (DoS) attacks, satellite signal spoofing, external eavesdropping, spamming, broadcast tampering, and man-in-the-middle attacks. In this article, the authors attempted to identify communication threats in the new robot-to-infrastructure (R2I) model based on available solutions used in transport, e.g., vehicle-to-infrastructure (V2I), taking into account the threats already known affecting the robot’s sensory systems. For this purpose, all threats that may occur in the robot’s communication with the environment were analyzed. Then the risk analysis was carried out, determining, in turn, the likelihood of potential threats occurrence, their consequence, and ability of detection. Finally, specific methods of responding to the occurring threats are proposed, taking into account cybersecurity aspects. A critical new approach is the proposal to use communication and protocols so far dedicated to transport (IEEE 802.11p WAVE, dedicated short-range communications (DSRC)). Then, the companion’s robot should be treated as a pedestrian and some of its sensors as an active smartphone.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 2889-2893

The Internet of Things is the network of numerous devices and communicate with an internet by using the IP address. The IOT objects shares the information using wireless connection. During the data transmission, that can be distorted by the Hackers by knowing their IP address. In IOT (Internet of Things), the wireless communication between the devices makes the users to be vulnerable. So, the hackers may spoof the MAC address of the communicating devices. The receiver MAC address is identified and then false MAC (Media Access Control) address is created by the hacker. Then, attackers replaces the original MAC address in the ARP (Address Resolution Protocol) table of the sender. So,the hackers may impersonate like the sender. Therefore, Cryptographic algorithms like AES (Advanced Encryption Standard) for confidentiality and ECDSA (Elliptic Curve Digital Signature Algorithm) for Authentication are applied in the proposed algorithm to safeguard the data as well as the devices from the hackers. The following attacks such as Man-in-the-Middle, Denial -of -Service (DOS) and ARP spoofing are strongly prevented in the proposed algorithm. Thus, the implementation of an algorithm is carried out in Ubuntu Linux environment with installing Python dependencies. This algorithm affords an efficient way to thwart ARP (Address Resolution Protocol) spoofing by the hackers for IOT devices.


Author(s):  
Deepak Kumar Sharma ◽  
Manish Devgan ◽  
Gaurav Malik ◽  
Prashant Dutt ◽  
Aarti Goel ◽  
...  

The world of computation has shown wide variety of wonders in the past decade with Internet of Things (IoT) being one of the most promising technology. Emergence of IoT brings a lot of good to the technology pool with its capability to provide intelligent services to the users. With ease to use, IoT is backed by a strong Cloud based infrastructure which allows the sensory IoT devices to perform specific functions. Important features of cloud are its reliability and security where the latter must be dealt with proper care. Cloud centric systems are susceptible to Denial of Service (DoS) attacks wherein the cloud server is subjected to an overwhelming number of incoming requests by a malicious device. If the same attack is carried out by a network of devices such as IoT devices then it becomes a Distributed DoS (DDoS) attack. A DDoS attack may render the server useless for a long period of time causing the services to crash due to extensive load. This paper proposes a lightweight, efficient and robust method for DDoS attack by detecting the compromised node connected to the Fog node or edge devices before it reaches the cloud by taking advantage of the Fog layer and prevent it from harming any information recorded or from increasing the unnecessary traffic in a network. The chosen technology stack consists of languages and frameworks which allow proposed approach to works in real time complexity for faster execution and is flexible enough to work on low level systems such as the Fog nodes. The proposed approach uses mathematical models for forecasting data points and therefore does not rely on a computationally heavy approach such as neural networks for predicting the expected values. This approach can be easily modelled into the firmware of the system and can help make cloud services more reliable by cutting off rogue nodes that try to attack the cloud at any given point of time.


2019 ◽  
Vol 8 (2) ◽  
pp. 3488-3493

Wide Area Networks (WANs) are subjected massive Denial of Service (DoS) attacks known as Distributed Denial of Service (DDoS) attacks. There are many distributed computing use cases in the real world. They include banking, insurance, e-Commerce and a host of other applications. In distributed environments, these applications are targeted by adversaries for launching DDoS attacks of various kinds. Such attacks cause the servers to be very busy answering fake traffic from the compromised nodes used by attackers from behind the scene. Large number of computers over Internet are compromised by attackers and through such machines DDoS attack is made. The server machines that provide services to genuine users become victims of such attacks. Detecting DDoS attacks is difficult in the presence of flash crowds that resembles DDoS traffic. As there are different kinds of DDoS attacks, it is understood, from the literature, that there is need for further research to have a comprehensive framework for detecting different kinds of DDoS attacks. In this paper we proposed a hybrid approach for detecting various kinds of DDoS attacks and simulation study is made to have proof of the concept. The results of the experiments revealed that the proposed methodology is useful to detect DDoS attacks in wide area networks.


Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 6918
Author(s):  
Khurram Shabih Zaidi ◽  
Sadaf Hina ◽  
Muhammad Jawad ◽  
Ali Nawaz Khan ◽  
Muhammad Usman Shahid Khan ◽  
...  

The prevalent use of the Internet of Things (IoT) devices over the Sea, such as, on oil and gas platforms, cargo, and cruise ships, requires high-speed connectivity of these devices. Although satellite based backhaul links provide vast coverage, but they are inherently constrained by low data rates and expensive bandwidth. If a signal propagated over the sea is trapped between the sea surface and the Evaporation Duct (ED) layer, it can propagate beyond the horizon, achieving long-range backhaul connectivity with minimal attenuation. This paper presents experimental measurements and simulations conducted in the Industrial, Scientific, and Medical (ISM) Band Wi-Fi frequencies, such as 5.8 GHz to provide hassle-free offshore wireless backhaul connectivity for IoT devices over the South China Sea in the Malaysian region. Real-time experimental measurements are recorded for 10 km to 80 km path lengths to determine average path loss values. The fade margin calculation for ED must accommodate additional slow fading on top of average path loss with respect to time and climate-induced ED height variations to ensure reliable communication links for IoT devices. Experimental results confirm that 99% link availability of is achievable with minimum 50 Mbps data rate and up to 60 km distance over the Sea to connect offshore IoT devices.


Security is the main concern for IOT devices as are expected to share a lot of crucial information about the user and his surroundings. The traditional security mechanisms are ineffective against sophisticated and advanced security attacks such as Man in the Middle Attack, Denial of Service attack, Identity cloning. Different solutions have been proposed for user authentication. Device authentication is crucial in IOT environment and cannot be neglected. Despite this device authentication has not gained equal attention from the research community. The aim of this research is to develop a lightweight and robust device authentication algorithm by Artificial Immune System to ensure data integrity in IoT networks. The concepts of Artificial Immune system are utilized for generating a non-redundant device signature which is used to differentiate between authentic and malicious nodes. The device signature is generated dynamically and is non reusable. This property makes the proposed algorithm secure against numerous high-level attacks such as frequency analysis attacks, Man in the Middle attack, side channel attacks, Denial of Service attack. The developed algorithm is tested in real time and prevents malicious nodes from entering the network. In addition to being immune against the high level attacks the proposed algorithm functions with low communication cost. The proposed algorithm can be used for providing security in IOT devices with limited battery life and processing power such as IOT enabled and remotely deployed Wireless Sensor Networks for forest fire detection, power plant monitoring , remote military applications and many others.


Sign in / Sign up

Export Citation Format

Share Document