Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques

被引:7
作者
Gayathri, Rajakumaran [1 ]
Usharani, Shola [1 ]
Mahdal, Miroslav [2 ]
Vezhavendhan, Rajasekharan [3 ]
Vincent, Rajiv [1 ]
Rajesh, Murugesan [1 ]
Elangovan, Muniyandy [4 ]
机构
[1] Vellore Inst Technol, Chennai Campus, Chennai 600127, India
[2] Tech Univ Ostrava, Fac Mech Engn, Dept Control Syst & Instrumentat, VSB, 17,Listopadu 2172-15, Ostrava 70800, Czech Republic
[3] Vellore Inst Technol, Vellore 632014, India
[4] Bond Marine Consultancy, Dept R&D, London EC1V 2NX, England
关键词
cloud computing; IoT; cloud security; access control list; simple network monitoring protocol; Amazon Web Service (AWS); moving target defense (MTD);
D O I
10.3390/s23031708
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback-Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface. The effectiveness of the proposed framework is validated through experimental simulations on the Amazon Web Service (AWS) platform, which shows a significant reduction in attack probabilities and delays. The integration of IoT and cloud technologies is a powerful combination that can deliver customized and critical solutions to major business vendors. However, ensuring the confidentiality and security of data among IoT devices, storage, and access to the cloud is crucial to maintaining trust among internet users. This paper demonstrates the importance of implementing robust security measures to protect IoT devices in the cloud environment and highlights the potential of the proposed solution in protecting against DDoS and false data injection attacks.
引用
收藏
页数:13
相关论文
共 31 条
[1]   Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review [J].
Ahmed, Afsheen ;
Latif, Rabia ;
Latif, Seemab ;
Abbas, Haider ;
Khan, Farrukh Aslam .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (17) :21947-21965
[2]  
Archana K.C., 2019, INT J ENG ADV TECHNO, V9, P240
[3]   Internet of Things Security: Challenges and Key Issues [J].
Azrour, Mourade ;
Mabrouki, Jamal ;
Guezzaz, Azidine ;
Kanwal, Ambrina .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[4]   Cryptanalysis of Farash et al.'s SIP authentication protocol [J].
Azrour, Mourade ;
Farhaoui, Yousef ;
Ouanan, Mohammed .
INTERNATIONAL JOURNAL OF DYNAMICAL SYSTEMS AND DIFFERENTIAL EQUATIONS, 2018, 8 (1-2) :77-94
[5]   Many-Objective Deployment Optimization for a Drone-Assisted Camera Network [J].
Cao, Bin ;
Li, Meng ;
Liu, Xin ;
Zhao, Jianwei ;
Cao, Wenxi ;
Lv, Zhihan .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04) :2756-2764
[6]   A Survey of Man In The Middle Attacks [J].
Conti, Mauro ;
Dragoni, Nicola ;
Lesyk, Viktor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2027-2051
[7]  
Feng Y., 2017, P 2017 IEEE INT C CO
[8]  
Gayathri Rajakumaran, 2019, International Journal of Web Based Communities, V15, P225
[9]  
Gayathri R., 2020, ADV MATH SCI J, V9, P5105, DOI [10.37418/amsj.9.7.76, DOI 10.37418/AMSJ.9.7.76]
[10]   Intrusion detection system using an optimized kernel extreme learning machine and efficient features [J].
Ghasemi, Jamal ;
Esmaily, Jamal ;
Moradinezhad, Reza .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 45 (01)