DDoS attacks in Industrial IoT: A survey

被引:17
作者
Chaudhary, Shubhankar [1 ]
Mishra, Pramod Kumar [1 ]
机构
[1] BHU, Dept Comp Sci, Inst Sci, Varanasi, India
关键词
IoT; IIoT; SDN; DDoS; IIoT architecture; Security; CYBER SECURITY; ACCESS-CONTROL; INTERNET; CLASSIFICATION; SYSTEMS;
D O I
10.1016/j.comnet.2023.110015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT provides automated, comprehensive, regressive and easy-to-use methods to look over its components. Along with the benefits, it also brings concerns that spawn from the IoT itself. Moreover, the challenges in the industries also add up because they have their own set of requirements and procedures to perform. Among those challenges, one of the prominent is DDoS attacks. So, through this paper, the DDoS attacks in IIoT is studied. This paper has culminated the work done in the domain involving IoT and IIoT. With this different forms of attacks involved in DDoS, the tools involved in generating the attacks and the overall traffic generators is also discussed. To elucidate, IIoT architecture and various layers involved in communication is discussed to correlate the threat of DDoS attacks in IIoT. Further, the studies made in various categories such as machine learning, deep learning, federated learning and transfer learning is elaborated. Finally, the challenges present in IIoT and the security requirements needed to overcome challenges in IIoT is explained.
引用
收藏
页数:27
相关论文
共 166 条
  • [1] SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection
    Ahakonye, Love Allen Chijioke
    Nwakanma, Cosmas Ifeanyi
    Lee, Jae-Min
    Kim, Dong-Seong
    [J]. INTERNET OF THINGS, 2023, 21
  • [2] Ahakonye Love Allen Chijioke, FED-MARINE: Federated Learning Framework for DDoS Detection and Mitigation in Maritime-SCADA Network
  • [3] Deep learning-based classification model for botnet attack detection
    Ahmed, Abdulghani Ali
    Jabbar, Waheb A.
    Sadiq, Ali Safaa
    Patel, Hiran
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 13 (7) : 3457 - 3466
  • [4] X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things
    Al-Hawawreh, Muna
    Sitnikova, Elena
    Aboutorab, Neda
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3962 - 3977
  • [5] Alashhab AA, 2022, INT J ADV COMPUT SC, V13, P371
  • [6] Alem S, 2019, I C COMP SYST APPLIC
  • [7] New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning
    Alhaidari, Fahd A.
    Al-Dahasi, Ezaz Mohammed
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 541 - 546
  • [8] Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
    Aljuhani, Ahamed
    [J]. IEEE ACCESS, 2021, 9 (42236-42264): : 42236 - 42264
  • [9] A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks
    Altunay, Hakan Can
    Albayrak, Zafer
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2023, 38
  • [10] OpenPLC: An IEC 61,131-3 compliant open source industrial controller for cyber security research
    Alves, Thiago
    Morris, Thomas
    [J]. COMPUTERS & SECURITY, 2018, 78 : 364 - 379