CFP last date
20 May 2024
Reseach Article

DoS Attacks in IoT Systems and Proposed Solutions

by Nada Abughazaleh, Ruba Bin Jabal, Mai Btish, Hemalatha M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 33
Year of Publication: 2020
Authors: Nada Abughazaleh, Ruba Bin Jabal, Mai Btish, Hemalatha M.
10.5120/ijca2020920397

Nada Abughazaleh, Ruba Bin Jabal, Mai Btish, Hemalatha M. . DoS Attacks in IoT Systems and Proposed Solutions. International Journal of Computer Applications. 176, 33 ( Jun 2020), 16-19. DOI=10.5120/ijca2020920397

@article{ 10.5120/ijca2020920397,
author = { Nada Abughazaleh, Ruba Bin Jabal, Mai Btish, Hemalatha M. },
title = { DoS Attacks in IoT Systems and Proposed Solutions },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2020 },
volume = { 176 },
number = { 33 },
month = { Jun },
year = { 2020 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number33/31416-2020920397/ },
doi = { 10.5120/ijca2020920397 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:08.372429+05:30
%A Nada Abughazaleh
%A Ruba Bin Jabal
%A Mai Btish
%A Hemalatha M.
%T DoS Attacks in IoT Systems and Proposed Solutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 33
%P 16-19
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The internet of things (IoT) has been gaining attention in the past decade, and this rapid growth is due to the many different advantages delivered towards achieving a smart world. However, security is one of the biggest challenges, as it builds upon the internet. This article surveys denial-of-service (DoS) attacks that occur in the network layer of IoT systems and the impact on various aspects. The Smurf and SYN flood attacks are briefly discussed along with several distinct DoS attack mitigation methods. Two DoS mitigation technologies implemented by IoT security companies are discussed as a case study.

References
  1. S. Rizvi, A. Kurtz, J. Pfeffer and M. Rizvi, "Securing the Internet of Things (IoT): A Security Taxonomy for IoT," in 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE , New York, 2018.
  2. M. H. Miraz, M. Ali, P. S. Excell and R. Picking, "A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)," in 2015 Internet Technologies and Applications (ITA), 2015.
  3. M. Burhan, R. A. Rehman, B. Khan and B. S. Kim, "IoT Elements, Layered Architectures and Security Issues: A comprehensive Survey," Sensors (Switzerland), vol. 18, no. 9, pp. 1-37, 2018.
  4. M. A. Razzaq, M. A. Qureshi, S. H. Gill and S. Ullah, "Security Issues in the Internet of Things (IoT): A Comprehensive Study," International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 383-388, 2017.
  5. L. Liang, K. Zheng, Q. Sheng and X. Huang, "A Denial of Service Attack Method for an IoT System," in 2016 8th International Conference on Information Technology in Medicine and Education (ITME), Fuzhou, 2016.
  6. NETSCOUT, "NETSCOUT Threat Intelligence Report," 2019.
  7. A. K. Gomez and S. Bajaj, "Challenges of Testing Complex Internet of Things (IoT) Devices and Systems," in 2019 11th International Conference on Knowledge and Systems Engineering (KSE), Da Nang, 2019.
  8. P. Sethi and S. Sarangi, "Internet of Things: Architectures, Protocols, and Applications," Journal of Electrical and Computer Engineering, vol. 2017, pp. 1-25, 2017.
  9. K. Chopra, K. Gupta and A. Lambora, "Future Internet: The Internet of Things-A Literature Review," in 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (Com-IT-Con), Faridabad, 2019.
  10. A. Roohi, M. Adeel and M. A. Shah, "DDoS in IoT: A Roadmap Towards Security & Countermeasures," in 2019 25th International Conference on Automation and Computing (ICAC), Lancaster, 2019.
  11. [1M. Anirudh, S. A. Thileeban and D. J. Nallathambi, "Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks," in IEEE International Conference on Computer, Communication, and Signal Processing (ICCCSP-2017), Melmaruvathur, 2017.
  12. "Cybersecurity: What you need to know about phishing, ransomware, and DoS attacks.," January 2019. [Online]. Available: https://revenuecycleadvisor.com/membership-check?destination=/node/5939. [Accessed 14 3 2020].
  13. CloudFlare, "Smurf DDoS Attack," CloudFlare , [Online]. Available: https://www.cloudflare.com/learning/ddos/smurf-ddos-attack/. [Accessed 14 3 2020].
  14. D. Peraković, M. Periša and I. Cvitić, "Analysis of the IoT Impact on Volume of DDoS Attacks," 2015.
  15. A. Lohachab, "Critical Analysis of DDoS—An Emerging Security Threat over IoT Networks," Journal of Communications and Information Networks, vol. 3, no. 3, pp. 57-78, 2018.
  16. Z. Liu, Y. Cao, M. Zhu and W. Ge, "Umbrella: Enabling ISPs to offer readily deployable and privacy-preserving DDoS prevention services," IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 1098-1108, 2019.
  17. Q. Jing, A. V. Vasilakos, J. Wan, J. Lu and D. Qiu, "Security of the Internet of Things: perspectives and challenges," Wireless Networks, vol. 20, no. 8, pp. 2481-2501, 2014.
  18. P. K. Chouhan, S. McClean and M. Shackleton, "Situation Assessment to Secure IoT Applications," in 2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS), Valencia, 2018.
  19. G. V. Hulme, "6 DoS attacks that made headlines," CSO, 22 9 2017. [Online]. Available: https://www.csoonline.com/article/3226399/6-dos-attacks-that-made-headlines.html#slide7. [Accessed 14 3 2020].
  20. R. Paudel, T. Muncy and W. Eberle, "Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach," in 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, 2019.
  21. S. Kajwadkar and V. K. Jain, "A Novel Algorithm for DoS and DDoS attack detection in Internet of Things," in 2018 Conference on Information and Communication Technology, CICT 2018, Madhya Pradesh , 2018.
  22. "BORDER ROUTING," Extreme Networks, [Online]. Available: https://www.extremenetworks.com/solution/border-routing/. [Accessed 31 3 2020].
  23. CISCO, "Implementing BGP Flowspec," in Cisco ASR 9000 Series Aggregation Services Router Routing Configuration Guide, Release 5.2.x, San Jose, Cisco Systems, 2014, pp. 175-201.
  24. "ERA Embedded Runtime Agent Protection," [Online]. Available: https://assets.ctfassets.net/u50eda8fk490/5KjRe7c29xsgajzzPyDRj5/0ccc9e586bdb3f815ff68affb4a00438/VDOO_ERA.pdf. [Accessed 31 3 2020].
  25. F. Meneghello, M. Calore, D. Zucchetto, M. Polese and A. Zanella, "IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8182-8201, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

IoT DoS DDoS network Smurf attack SYN flood