A Detailed Review On Security
A Detailed Review On Security
A Detailed Review on
Security Issues in Layered
Architectures and Distributed
Denial Service of Attacks Over
IoT Environment
Rajarajan Ganesarathinam1*, Muthukumaran Singaravelu2
and K.N. Padma Pooja3
1
School of Computer Science and Engineering, Vellore Institute of Technology,
Vellore, India
2
Department of Computer Science and Engineering, Anna University,
Chennai, India
3
Department of Computer Science and Engineering, Thiagarajar College of
Engineering, Madurai, India
Abstract
The promising nature of the Internet, its related technologies, and the applica-
tions has brought a significant impact on human beings’ day-to-day activities in
the past three decades. As a part of its evolution, the current trend is the Internet
of Technology (IoT), which brings automation to the next level via connecting
the devices through the Internet, and its benefits are tremendous. Meanwhile,
the threats and attacks are also evolving and become an unstoppable menace to
IoT users and applications. In this chapter, we are presenting the various security
loopholes and concerns in the existing layered architectures of IoT. Out of many
attacks and threats over IoT, we have specifically chosen Distributed Denial of
Service (DDoS) attacks because of its severity in the IoT environment and dealt
extensively with the different categories of DDoS impact as well as a review of
existing countermeasures against DDoS in IoT. Further, this chapter addresses
critical challenges and future research directions concerning IoT security that
gives insights to the new researchers in this domain.
Uzzal Sharma, Parma Nand, Jyotir Moy Chatterjee, Vishal Jain, Noor Zaman Jhanjhi and R. Sujatha
(eds.) Cyber-Physical Systems: Foundations and Techniques, (85–122) © 2022 Scrivener Publishing
LLC
85
86 CyBeR-PHYSICAL SysteMS
5.1 Introduction
Undoubtedly, the Internet has become an indispensable entity in all
walks of human life. Due to its tremendous growth, it becomes a basic
need for millions of people to meet their demands. The Internet is used
by approx- imately half of the world’s population [1, 2]. Taking
advantage of the Internet’s numerous benefits, another area known as the
Internet of Things uses the Internet to link objects and machines to
communicate with one another [3]. The aim of this cutting-edge
technology is to improve auto- mation by linking objects through the
Internet. As a result, sectors like government, healthcare, logistics,
agriculture, business, education, etc., are experiencing the impact of IoT
in socio-economic aspects and encourag- ing the researchers to explore
further in this technology to raise this digital world into another level [4–
7]. Thus, IoT is a digital ecosystem that caters applications to multiple
domains, as shown in Figure 5.1, by interoper- ability among the
physical devices. Because of its better outcomes and
SMART HOSPITAL
TRAIN SMART HOME
Internet of
Things
AEROPLANE
SMART CITIES
60
40
30
20
10
0
2012 2013 2014 2015 2016 2017 2018 2019 2020
Years
comforts in human life, the numbers of IoT devices are increasing year
by year. Figure 5.2 shows the trend of IoT devices population. Gartner
Inc. [8] forecasted that more than 125 billion Internet-linked gadgets
would be in practice, and by average, each person owns 15 connected
devices in 2030. To achieve the interconnectivity among the IoT devices
as well as to form a well-established infrastructure for IoT ecosystem,
multiple heterogeneous platforms, elements, architectures [9] are needed,
that will be discussed in next subsequent section.
On the other hand, by recognizing the buzz of IoT in market shares,
many firms and organizations have been driven to develop more IoT
devices as quickly as possible to sustain their positions, with the motive
of functionality, not on security. As a result, IoT security has been
severely affected [10, 11]. In the security perspective, the rush in the IoT
revolution so far with less focus on the security of IoT devices, leads to
the foundation of potential disaster [12]. Not only benefits, but there are
also multiple challenges like energy efficiency, interoperability of hetero-
geneous platforms, poor management, device identification, privacy and
trust encompassing IoT architecture [13]. The most important of these
concerns are security and privacy. Unless it is focused on proper motive
and care, IoT becomes the Internet of dangerous threats and attacks. The
infusion of more and more non-secure devices from the market and its
interconnectivity poison the IoT digital ecosystem [14–16]. Thus, the
abundance of IoT devices has the possibility of being prey to a variety
of malwares [17], which solicit attackers to inflict havoc in Figure 5.3.
Further details about the extensive nature of DDoS will be covered in the
subsequent sections.
88 CyBeR-PHYSICAL SysteMS
4
New Malwares
0
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020
Years
The rest of the chapter is organized as follows: Section 5.2 briefs about IoT
components, different layers of IoT architecture and its security
loopholes. Section 5.3 overviews about DDoS attacks, its working
mechanisms, classifi- cation and its impact over IoT in a detailed manner.
The extensive literature survey about solution mechanisms specific to
DDoS attacks in IoT are dis- cussed in Section 5.4. Section 5.5 suggests the
research challenges and further directions towards DDoS-free IoT. Section
5.6 concludes this review chapter.
1. Identity
6. Semantics 2. Sense
3. Communication
5.
Services
4. Compute
THREE LAYER
APPLICATION LAYER
NETWORK LAYER
PERCEPTION LAYER
FOUR LAYER
APPLICATION LAYER
NETWORK LAYER
SUPPORT LAYER
PERCEPTION LAYER
FIVE LAYER
BUSINESS LAYER
APPLICATION LAYER
PROCESSING LAYER
TRANSPORT LAYER
PERCEPTION LAYER
5.2.3.14 Malwares
The main motive behind the injection of malware into IoT is to steal the
confidentiality of information [53]. That is, applying worms, viruses,
spy- wares, trojans, adwares, etc., to interact with the system.
All types of attacks are harmful, and measures should be taken to pre-
vent or avoid these attacks. Out of many attacks which we discussed, the
most significant, dangerous, impactful attack over IoT environment is
Distributed Denial of Service Attacks (DDoS). The next section deals
with the DDoS attack over IoT in a significant manner.
Stage 1: Exploitation
Stage 1: Recruitment
Stage 3: Communication
Stage 4: Attack
Client Client
Handlers
Handlers
Agents
Reflectors
Agents
Control Traffic
Attack Traffic
(Primary) Victim (Primary) Victim
Clients
Clients
Agents
Agents
(Primary) Victim
(Primary) Victim
(c) IRC based model (d) Agent Handler Model
Figure 5.9 (a) Agent-Handler Model; (b) Reflector Model; (c) IRC based model; (d)
Peer- to-Peer model.
P2P network, not on C&C based network. As a result, the attacker has
some benefits like robustness, fault-tolerance compared to C&C model.
• Resource Depletion
• Bandwidth Depletion.
• Network-level
• Application-level.
• Manual
• Semi-automatic
• Automatic.
• Random Scanning
• Hitlist Scanning
• Permutation Scanning
• Local subnet Scanning.
• Constant Rate
• Variable Rate.
• Isotropic
• Non-Isotropic.
Handling Environment
6. Malicious
New Bot Victims
Bot 8. Attack
5. Infect Command Brute Force
C&C Attack/
Legitimate
Packets
Target Server
7. Attack
3. Report Command Legitimate Packet Target Attacked Environment
4.
Check
Status
Report 1. Send
Server Command
Legitimate User
Centralized
Management
Interface
Attacking Environment
the Event processor evaluate the type of DDoS attack and record its exis-
tence and properties. The action engine—the final layer—deals with sus-
picious attack traffic and blocks links to relevant resources. This
technique is advantageous in detecting the attack traffic with high
accuracy, but the false positive rate is computed as around 8%, which is
unacceptable in a real-time scenario.
The research work presented in [85] is about detecting the botnets
based on Power Spectral Density (PSD). The authors presented a model
called PsyBOG—a signal processing technique that finds the main
frequencies by using botnets’ periodic DNS queries. By observing the
simultaneous behavioral pattern as well as the periodic behavioral pattern
of DNS traffic, the botnet traffic, legitimate traffic and infrequent traffic
can be separated. The simulation-based experiment results showed that
this approach is via- ble for large-scale IoT systems as scalability is not
affected by voluminous traffic.
In [86], the use of machine learning techniques to detect malicious
traffic is proposed. This work presented a model called T-IDS: Advanced
Traffic-based Intrusion Detection System, which uses a network traffic
fea- ture collection, feature selection techniques, and a randomized data
parti- tioned learning model to detect intrusions (RDPLM). Voronoi-
based data partitioning and clustering is preferred for data reduction after
the dataset has been collected and preprocessed. Finally, based on the
input dataset’s heterogeneity, a meta-learning prototype with multiple
randomized trees is developed. This makes it easier to detect malicious
traffic, but the down- side is that when dealing with large sets of data, the
running time and com- puting capability of this model grows
exponentially.
In [87], the behavioral study of DNS registration is used to detect the
botnets. This approach focuses on early detection by analyzing the bots
during DNS registrations as well as communication with C&C servers.
By using the domain name generating algorithms and other tracking ser-
vices, the suspicious bots should be blacklisted. Since this methodology
is entirely focused on botnet datasets, such datasets must be provided
with care.
Thedetectionofmobilebotnetisabitcomplicatedthanstaticbotnetworks.
[88] proposed signature-based mobile botnet detection. This approach
has three modules, namely the multi-agent system, signature-based
detection and decision-action module. The multi-agent system manages
traffic and gathers information from various Android devices. The
detection module gathers data from the central server and uses pattern-
matching algorithms to identify known botnets. Finally, decision-module
decides the eviction of botnets from IoT. The main drawback in this
approach is it is ineffective
SeCURITY IssUes ANd DDoS AttACKS OveR IoT 109
at the upstream router regulates the packet flow towards the web server.
If the voluminous traffic more than the capacity of the server reaches the
edge router, this mechanism throttle the flow and prevent the crash of the
web server. Secure Overlay Service (SOS) is also once considered as a
pre- vention mechanism against DDoS, but its scope is narrow, and it is
ineffec- tive against new routing protocol having in-built security
loopholes. The working mechanism of SOS is presented in [96].
Nowadays, DDoS attackers are exploiting the features of Software
Defined Networking (SDN) and making it as a source platform for con-
ducting DDoS attacks over IoT environment [97] introduced the S-Flow
technique, which combines the potential of SDN with traffic flow and
defines a metric called DCN to quantify packet flow distribution and
inten- sity. As an extension of this work, [98] presented floodlight-based
guard system in which anti-spoofing module of source IP and S-Flow
technology is combined to make sFlow-RT is efficient against IP spoofing
based DDoS attacks in SDN.
The work presented in [99] is exclusively for Service Oriented
Architecture of IoT to deal against DDoS attacks. The authors proposed a
model called Learning Automata to thwart DDoS in SOA based IoT plat-
forms. The significant feature in this approach is that it builds on the top
of cross-layer technology and so it is instrumental in capturing attack
packets with less overhead. The more in-depth analysis of this working
mechanism is found in [99].
To minimize the effect of DDoS attacks, [100] proposes a construc-
tive auto-responsive honeypot architecture. The main goal of this system
is to keep the network stable by making resources inaccessible to DDoS
attackers. The NS-2 based simulation results proved that this technique
had reduced the false-negative rate. But the main drawback is more over-
head in the network.The classifier System DDoS is introduced in [101] as
a way to detect and prevent DDoS attacks by sorting incoming packets
and making an inference using classifiers. The authors proposed four
different classifiers to segregate and blacklist malicious traffic with the
assumption that IP spoofing is not involved. Therefore, it is working only
for legitimate IP packets, not for spoofed IP addresses. The experimental
results were tested using k-fold validation, which showed that it is 97%
accurate with a kappa coefficient of 0.89 under single attack and 94%
accurate with a kappa coefficient of 0.9 under multiple attacks.
The collaborative efforts by IBM and Akamai lead to the development
of multi-faceted prevention mechanism against DDoS attack called
“Kona Site Defender”. This is robust in handling DDoS attacks in such a
way that request traffic load is redirected to various geographically
distributed
Table 5.2 Summary of existing countermeasures against DDoS
servers and filters the attack traffic from the incoming traffic flow [102].
Table 5.2 summarizes the merits and demerits of existing solution
mechanisms.
5.6 Conclusion
The impact of IoT in the upcoming years is unstoppable. This technol-
ogy would be the driving force of bringing automation to the next level.
Meanwhile, the security issues and loopholes are also tightly binding with IoT
architectures. As a result, dangerous attacks like DDoS, botnet based
attacks, etc., are causing havoc to well-developed IoT application. Unless
it is dealt with needful research in the critical time, IoT becomes “Internet of
Threats”. Motivated by this exacerbated situation, we have articulated the
security loop- holes in the layered architectures of IoT. In specific, we have
chosen
Distributed Denial of Service (DDoS) attacks, and its menace over the
IoT infrastructure is analyzed extensively along with its up-to-date taxon-
omy. From the detailed survey of the existing solution mechanism
against DDoS over IoT environment, the general issues are identified,
and critical challenges are sorted out for further research. Therefore, it is
an urgent requirement to standardize the protocols compounding the
security of IoT to create robust post-quantum IoT paradigm.
References
1. Internet Users. Available online: http://www.Internetlivestats.com/Internet-
users/ (accessed on 07 May 2020).
2. Global Internet Usage. Available online: https://www.en.wikipedia.org/wiki/
Global_Internet_usage/(accessed on 07 May 2017).
3. Oppitz, M. and Tomsu, P., Inventing the Cloud Century: How Cloudiness
Keeps Changing Our Life, Economy and Technology, Springer, Cham,
2017.
4. Hongbo, Z., Longxiang, Y., Qi, Z., Shi, J., Ubiquitous information service net-
works and technology based on the convergence of communications, com-
puting and control. J. Commun. Inf. Netw., 1, 1, 98–110, 2016.
5. Yichuan, W., Yefei, Z., Xinhong, H., Wenjiang, J., Weigang, M., Game
strategies for distributed denial of service defense in the Cloud of Things.
J. Commun. Inf. Networks., 11, 44, 143–155, 2016.
6. Irina, B., Tanczer, L., Carr, M., Blackstock, J., Regulating IoT: Enabling or
Disabling the Capacity of the Internet of Things? Risk Regul., 12–15,
2017;33, August. https://core.ac.uk/download/pdf/81675775.pdf
116 CyBeR-PHYSICAL SysteMS
23. Koshizuka, N. and Sakamura, K., Ubiquitous ID: Standards for ubiquitous
computing and the internet of things. IEEE Pervasive Comput., 9, 4, 98–
101, 2010.
24. McDermott-Wells, P., What is Bluetooth? IEEE Potentials, 23, 5, 33–35, 2005.
25. Want, R., An introduction to RFID technology. IEEE Pervasive Comput., 5, 1,
25–33, 2006.
26. Crosby, G.V. and Vafa, F., Wireless sensor networks and LTE-A network
con- vergence. Proc. - Conf. Local Comput. Networks, 2013, LCN, pp.
731–734, October 2013.
27. Want, R., Near field communication. IEEE Pervasive Comput., 10, 3, 4–7,
2011.
28. Levis P. et al. (2005) TinyOS: An Operating System for Sensor Networks.
In: Weber W., Rabaey J.M., Aarts E. (eds), Ambient Intell., Springer,
Berlin, Heidelberg. https://doi.org/10.1007/3-540-27139-2_7.
29. Cao, Q., Abdelzaher, T., Stankovic, J., He, T., The LiteOS operating
system: Towards Unix-like abstractions for wireless sensor networks. Proc.
- 2008 Int. Conf. Inf. Process Sens. Networks, IPSN 2008, pp. 233–244,
Published online 2008.
30. Xing, X.J., Wang, J.L., Li, M.D., Services and key technologies of the
Internet of Things. ZTE Commun., 8, 2, 2010.
31. Gigli, M. and Koo, S., Internet of Things: Services and Applications
Categorization. Adv. Internet Things, 01, 02, 27–31, 2011.
32. Mashal, I., Alsaryrah, O., Chung, T.Y., Yang, C.Z., Kuo, W.H., Agrawal,
D.P., Choices for interaction with things on Internet and underlying issues.
Ad. Hoc. Netw., 28, 68–90, 2015.
33. Mashal, I., Alsaryrah, O., Chung, T.Y., Yang, C.Z., Kuo, W.H., Agrawal,
D.P., Choices for interaction with things on Internet and underlying issues.
Ad. Hoc. Netw., 28, 68–90, 2015.
34. Said, O. and Masud, M., Towards internet of things: Survey and future
vision. Int. J. Comput. Netw., 5, 1, 1–17, 2013. http://www.cscjournals.org/
csc/manuscript/Journals/IJCN/volume5/Issue1/IJCN-265.pdf.
35. Simpson, A.K., Roesner, F., Kohno, T., Securing vulnerable home IoT devices
with an in-hub security manager. 2017 IEEE Int. Conf. Pervasive Comput.
Commun. Work PerCom Work 2017, pp. 551–556, 2017;(PerLS).
36. Darwish, D.G. and Square, E., Improved Layered Architecture for Internet
of Things. Int. J. Comput. Acad. Res., 4, 4, 214–223, 2015.
http://www.meacse. org/ijcar.
37. Madakam, S., Ramaswamy, R., Tripathi, S., Internet of Things (IoT): A
Literature Review. J. Comput. Commun., 03, 05, 164–173, 2015.
38. Khan, R., Khan, S.U., Zaheer, R., Khan, S., Future internet: The internet of
things architecture, possible applications and key challenges. Proc - 10th
Int. Conf. Front Inf. Technol. FIT 2012, 2012, pp. 257–260, April 2017.
39. Sethi, P. and Sarangi, S.R., Internet of Things: Architectures, Protocols,
and Applications. J. Electr. Comput. Eng., 2017, 9324035, 25, 2017.
118 CyBeR-PHYSICAL SysteMS
40. Vivekananda Bharathi, M., Tanguturi, R.C., Jayakumar, C., Selvamani, K.,
Node capture attack in Wireless Sensor Network: A survey. IEEE Int.
Conf. Comput. Intell. Comput. Res. ICCIC 2012, 2012;(i, 2012).
41. Puthal, D., Nepal, S., Ranjan, R., Chen, J., Threats to Networking Cloud
and Edge Datacenters in the Internet of Things. IEEE Cloud Comput., 3, 3,
64–71, 2016, doi: 10.1109/MCC.2016.63.
42. Brumley, D. and Boneh, D., Remote timing attacks are practical. Comput.
Netw., 48, 5, 701–716, 2005.
43. Sonar, K. and Upadhyay, H., A Survey : DDOS Attack on Internet of
Things. 10, 11, 58–63, 2014.
44. Nguyen, A.T., Mokdad, L., Ben-Othman, J., Solution of detecting jamming
attacks in vehicle ad hoc networks. MSWiM 2013 - Proc 16th ACM Int.
Conf. Model Anal. Simul. Wirel. Mob. Syst., pp. 405–410, Published online
2013.
45. Thakur, N., Introduction to Jamming Attacks and Prevention Techniques
using Honeypots in Wireless Networks. IRACST –Int. J. Comput. Sci. Inf.
Technol. Secur., 3, 2, 2249–9555, 2013.
46. Ahmadian, Z., Salmasizadeh, M., Aref, M.R., Desynchronization attack on
RAPP ultralightweight authentication protocol. Inf. Process Lett., 113, 7,
205–209, 2013.
47. Prabhakar, S., Network Security in Digitalization: Attacks and Defence. Int.
J. Res. Comput. Appl. Rob., www.ijrcar.com. 5, 46–52, 2017,
http://www.ijrcar. com/Volume_5_Issue_5/v5i512.pdf.
48. Exploit Attack in Network Layer Available online. http://searchsecurity.
techtarget.com/definition/exploit/ (accessed on 07 May 2020).
49. Conti, M., Dragoni, N., Lesyk, V., A Survey of Man in the Middle Attacks.
IEEE Commun. Surv. Tutor., 18, 3, 2027–2051, 2016.
50. Gupta, S. and Gupta, B.B., Cross-Site Scripting (XSS) attacks and defense
mechanisms: classification and state-of-the-art. Int. J. Syst. Assur. Eng.
Manage., 8, 512–530, 2017.
51. Sanzgiri, A. and Dasgupta, D., Classification of insider threat detection
techniques. Proc. 11th Annu. Cyber Inf. Secur. Res. Conf. CISRC 2016, 5–
8, Published online 2016.
52. Nurse, J.R.C., Erola, A., Agrafiotis, I., Goldsmith, M., Creese, S., Smart
Insiders: Exploring the Threat from Insiders Using the Internet-of-Things.
Proc. - 2015 Int. Work Secur. Internet Things, SIoT 2015, pp. 5–14,
Published online 2016.
53. Canzanese, R., Kam, M., Mancoridis, S., Toward an automatic, online
behav- ioral Malware classification system. Int. Conf. Self-Adaptive Self-
Organizing Syst. SASO, pp. 111–120, Published online 2013.
54. Bilge, L. and Dumitras, T., Before we knew it: An empirical study of zero-
day attacks in the real world. Proc. ACM Conf. Comput. Commun. Secur.
2012,
pp. 833–844, October 2012.
55. Kaur, R. and Singh, M., A survey on zero-day polymorphic worm
detection techniques. IEEE Commun. Surv. Tutor., 16, 3, 1520–1549, 2014.
SeCURITY IssUes ANd DDoS AttACKS OveR IoT 119
56. Rajarajan, G. and Ganesan, L., A decoy framework to protect server from
wireless network worms. Wirel. Pers. Commun., 94, 4, 1965–1978, 2017.
57. Dragoni, N., Massacci, F., Saidane, A., A self-protecting and self-healing
framework for negotiating services and trust in autonomic communication
systems. Comput. Netw., 53, 10, 1628–1648, 2009.
58. Mirkovic, J. and Reiher, P., A taxonomy of DdoS attack and DdoS defense
mechanisms. Comput. Commun. Rev., 34, 2, 39–53, 2004.
59. Douligeris, C. and Mitrokotsa, A., DdoS attacks and defense mechanisms:
Classification and state-of-the-art. Comput. Netw., 44, 5, 643–666, 2004.
60. Tariq, U., Hong, M.P., Lhee, K.S., A comprehensive categorization of
DDoS attack and DDoS defense techniques. Lect. Notes Comput. Sci.
(including Subser Lect Notes Artif. Intell. Lect Notes Bioinformatics), 4093
LNAI(Mic):1025–1036, 2006.
61. Hussain, A., Heidemann, J., Papadopoulos, C., A Framework for
Classifying Denial of Service Attacks. Comput. Commun. Rev., 33, 4, 99–
110, 2003.
62. Alomari, E., Manickam S, B., Gupta, B., Karuppayah, S., Alfaris, R.,
Botnet- based Distributed Denial of Service (DDoS) Attacks on Web
Servers: Classification and Art. Int. J. Comput. Appl., 49, 7, 24–32, 2012.
63. Specht, S.M. and Lee, R.B., Distributed Denial of Service: Taxonomies of
Attacks, Tools and Countermeasures. Int. Work Secur. Parallel Distrib.
Syst., 9, 543–550, 2004.
64. RioRey Inc, Taxonomy of DDoS Attacks, 2014. https://www.servermania.
com/gallery/resources/RioRey Taxonomy DDoS Attacks 2.6 2014.pdf.
65. Kumar, K., Joshi, R.C., Singh, K., An Integrated Approach for Defending
Against Distributed Denial-of-Service (DDoS ) Attacks. Iriss, 1–6,
Published online 2006.
66. Singh, E.G. and Gupta, E.M., Distributed denial-of-service. International
Journal of Computer and Electrical Engineering (IJCEE), 2, 2, 268–276,
2010.
67. Paxson, V., An analysis of using reflectors for distributed denial-of-service
attacks. ACMSIGCOMM Comput. Commun. Rev., 31, 3, 38–47, 2001.
68. Gibson, S., DRDoS:Description and Analysis of A Potent, in: Increasingly
Prevalent, and Worrisome Internet Attack, Gibson Research Corporation,
Dayton, Ohio, United States, 2002.
69. Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A., Developing
Realistic Distributed Denial of Service (DDoS) Attack Dataset and
Taxonomy, in: 2019 International Carnahan Conference on Security
Technology (ICCST),
pp. 1–8, 2019.
70. Chang, R., Defendinf against Flooding-Based Distributed Denial-of-
Service Attacks: A Tutorial. IEEE Commun. Mag., 40, 10, 42–51, 2002,
October.
71. Zargar, S.T., Joshi, J., Tipper, D., A survey of defense mechanisms against
distributed denial of service (DDOS) flooding attacks. IEEE Commun.
Surv. Tutor., 15, 4, 2046–2069, 2013.
120 CyBeR-PHYSICAL SysteMS
72. Ranjan, S., Swaminathan, R., Uysal, M., Knightly, E., DDoS-resilient sched-
uling to counter application layer attacks under imperfect detection. Proc.-
IEEE INFOCOM, pp. 1–13, Published online 2006.
73. Networks, A., Thegrowingthreatofapplication-Layer DDoSattacks. Tech. Rep.,
2011, https://dsimg.ubm-us.net/envelope/126712/324232/1298913706623_
AB_ALDDoS_EN_LGQ1.pdf.
74. Gupta, B.B., Joshi, R.C., Misra, M., Defending against distributed denial of
service attacks: Issues and challenges. Inf. Secur. J., 18, 5, 224–247, 2009.
75. Taking charge of the IoT’s security vulnerabilities (White Paper), 2017.
76. Cao, C., Guan, L., Liu, P., Gao, N., Lin, J., Xiang, J., Hey, you, keep away
from my device: remotely implanting a virus expeller to defeat Mirai on
IoT devices. 1–15, Published online 2017, http://arxiv.org/abs/1706.05779.
77. Sood, A.K., Zeadally, S., Bansal, R., Cybercrime at a scale: A practical
study of deployments of HTTP-based botnet command and control panels.
IEEE Commun. Mag., 55, 7, 22–28, 2017.
78. Darwish, A., El-Gendy, M.M., Hassanien, A.E., A new hybrid
cryptosystem for Internet of Things applications, in: Multimedia Forensics
and Security, vol. 115, pp. 365–380, 2016.
79. Gupta, A. and Gupta, B., Honeynettrap: Framework to detect and miti-
gate ddos attacks using heterogeneous honeynet, in: 2017 International
Conference on Communication and Signal Processing (ICCSP), IEEE,
pp. 1906–1911, 2017.
80. Weiler, N., Honeypots for distributed denial-of-service attacks, 109–114,
ISBN 0-7695-1748-X, 02, 2002.
81. Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Bose, N., Ye, Z., FOCUS:
A fog computing-based security system for the Internet of Things, in: 2018
15th IEEE Annual Consumer Communications Networking Conference
(CCNC),
pp. 1–5, 2018.
82. E. Hodo et al., Threat analysis of IoT networks using artificial neural
network intrusion detection system, 2016 International Symposium on
Networks, Computers and Communications (ISNCC), 1–6, 2016.
83. Toklu, S. and Simsek, M., Two-layer approach for mixed high-rate and
low- rate distributed denial of service (ddos) attack detection and filtering.
Arab.
J. Sci. Eng., 43, 12, 7923–7931, 2018.
84. da Silva Cardoso, A.M., Lopes, R.F., Magalhaes, F.B.V., Real-time ddos
detec- tion based on complex event processing for iot, in: 2018 IEEE/ACM
Third International Conference on Internet-of-Things Design and
Implementation (IoTDI), IEEE, pp. 273–274, 2018.
85. Kwon, J., Lee, J., Lee, H., Perrig, A., PsyBoG: A scalable botnet detection
method for large-scale DNS traffic. Comput. Netw., 97, 48–73, 2016.
86. Al-Jarrah, O.Y., Alhussein, O., Yoo, P.D., Muhaidat, S., Taha, K., Kim,
K., Data Randomization and Cluster-Based Partitioning for Botnet
Intrusion Detection. IEEE Trans. Cybern., 46, 8, 1796–1806, 2016.
SeCURITY IssUes ANd DDoS AttACKS OveR IoT 121
87. Dietz, C., Sperotto, A., Dreo, G. et al., How to Achieve Early Botnet
Detection at the Provider Level ? 10th IFIP International Conference on
Autonomous Infrastructure, Management and Security (AIMS), pp.142–
146, Munich, Germany, Jun 2016.
88. Alzahrani, A.J. and Ghorbani, A.A., SMS mobile botnet detection using a
multi-agent system: Research in progress. ACM Int. Conf. Proceeding Ser.,
Published online 2014.
89. Kirubavathi, G. and Anitha, R., Structural analysis and detection of android
botnets using machine learning techniques. Int. J. Inf. Secur., 17, 2, 153–
167, 2018.
90. Natarajan, V., Sheen, S., Anitha, R., Detection of StegoBot: A covert
social network botnet. ACM Int. Conf. Proceeding Ser., pp. 36–41,
Published online 2012.
91. Venkatachalam, N. and Anitha, R., A multi-feature approach to detect
Stegobot: a covert multimedia social network botnet. Multimed. Tools
Appl., 76, 4, 6079–6096, 2017.
92. Han, F., Xu, L., Yu, X., Tari, Z., Feng, Y., Hu, J., Sliding-mode observers
for real-time DDoS detection. Proc. 2016 IEEE 11th Conf. Ind. Electron
Appl. ICIEA 2016, pp. 825–830, 2016;(51577039).
93. Ferguson, P. and Senie, D., Network ingress filtering: Defeating denial of
ser- vice attacks which employ IP source address spoofing, in: RFC 2827,
2001.
94. Lee, Y., Lee, W., Shin, G., Kim, K., Assessing the impact of dos attacks on
iot gateway, in: Advanced Multimedia and Ubiquitous Engineering, pp. 252–
257, Springer, 2017.
95. Wisthoff, M., Ddos countermeasures, in: Information Technology - New
Generations, pp. 915–919, Springer, 2018.
96. Keromytis, A.D., Misra, V., Rubenstein, D., SOS: secure overlay services.
In Proceedings of the 2002 conference on Applications, technologies,
architectures, and protocols for computer communications (SIGCOMM '02),
Association for Computing Machinery, New York, NY, USA, 61–72, 2002.
97. Lu, Y. and Wang, M., An easy defense mechanism against botnet-based
DDoS flooding attack originated in SDN environment using sFlow. ACM
Int. Conf. Proceeding Ser., pp. 14–20, 2016;15-17-June.
98. Liu, J., Lai, Y., Zhang, S., FL-GUARD: A detection and defense system
for DDoS attack in SDN. ACM Int. Conf. Proceeding Ser., pp. 107–111,
Published online 2017.
99. Misra, S., Venkata Krishna, P., Agarwal, H., Saxena, A., Obaidat, M.S., A
learning automata based solution for preventing distributed denial of
service in internet of things. Proc - 2011 IEEE Int. Conf. Internet Things
Cyber, Phys. Soc. Comput. iThings/CPSCom 2011, pp. 114–122, Published
online 2011.
100. Sardana, A. and Joshi, R., An auto-responsive honeypot architecture for
dynamic resource allocation and QoS adaptation in DDoS attacked net-
works. Comput. Commun., 32, 12, 1384–1399, 2009.
122 CyBeR-PHYSICAL SysteMS
101. Sahi, A., Lai, D., Li, Y., Diykh, M., An Efficient DDoS TCP Flood Attack
Detection and Prevention System in a Cloud Environment. IEEE Access, 5,
c, 6036–6048, 2017.
102. Kamboj, P., Trivedi, M.C., Yadav, V.K., Singh, V.K., Detectiontechniques
of ddos attacks: A survey, in: 2017 4th IEEE Uttar Pradesh Section
International Conference on Electrical, Computer and Electronics (UPCON),
IEEE, pp. 675– 679, 2017.
103. Shang, W., Ding, Q., Marianantoni, A., Burke, J., Zhang, L., Securing
build- ing management systems using named data networking. IEEE Netw.,
28, 3, 50–56, 2014.
104. Liu, J., Xiao, Y., Chen, C.L.P., Authentication and access control in the
Internet of things. Proc. - 32nd IEEE Int. Conf. Distrib. Comput. Syst.
Work ICDCSW 2012, pp. 588–592, Published online 2012.
105. Millman, R., KrebsOnSecurity hit with record DDoS,
KrebsonSecurityBlog, 2016.
https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/.