Effective mitigation against IoTs using super materials for distributed denial of service attacks in cloud computing

被引:2
作者
Bhardwaj, Aanshi [1 ]
Mangat, Veenu [1 ]
Vig, Renu [1 ]
机构
[1] Panjab Univ, UIET, Chandigarh 160023, India
关键词
Cloud Computing; DDoS; IoT; Super materials; Mitigation; Behavior based filtering;
D O I
10.1016/j.matpr.2020.04.800
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computing technology has a key role to play in growing IT services. However, attacks can put the availability of the IT services in danger. One such deadliest attack is IoT based Distributed Denial of Service (DDoS) attacks. The use of super materials like Graphene, Carbon nanotubes, Molybdenum disulfide (MoS2) etc. are revolutionizing the manufacturing of new Internet of Things (IoTs). These super materials are flexible, light weight, high performing and thus allows to expand the range of IoTs. Moreover, the growth of vulnerable IoT devices are increasing at an alarming rate. The bot herders take the control of these vulnerable IoT devices and launch massive DDoS attacks against the cloud systems. This leads to unavailability of the services and economic or reputation losses. A mirai botnet exploited large number of IoT devices and successfully executed the largest DDoS attack of this kind. Hence, it is very important to mitigate these attacks and lower its impact. There are various captcha based strategies (like text based, audio based, video based etc.) for blocking the traffic generated by bots towards the victim. These blocking techniques for mitigation are inflexible, expensive and time consuming. In this paper we propose a novel approach based on gesture verification for effective mitigation of DDoS attacks. The clients are challenged with captcha based on gesture verification. The IoT devices are not capable of making gestures for passing the challenge. Gestures can be simply drawing a circle or a line etc. The IoT devices generating attack are blocked and legitimate users pass the challenge and thus access the services. The proposed method is fast and is less expensive than the state-of-the-art methods. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1359 / 1362
页数:4
相关论文
共 16 条
[1]  
Hasan W K., 2016, International Journal of Computer Science and Engineering Survey, V7, P1, DOI 10.5121/ijcses.2016.7301
[2]   Cochain-SC: An Intra- and Inter-Domain Ddos Mitigation Scheme Based on Blockchain Using SDN and Smart Contract [J].
Houda, Zakaria Abou El ;
Hafid, Abdelhakim Senhaji ;
Khoukhi, Lyes .
IEEE ACCESS, 2019, 7 :98893-98907
[3]  
Huang H., 2019, Front. Chem, P7
[4]   A DDoS Mitigation System with Multi-Stage Detection and Text-Based Turing Testing in Cloud Computing [J].
Huang, Vincent Shi-Ming ;
Huang, Robert ;
Chiang, Ming .
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, :655-662
[5]   Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks [J].
Karapoola, Sareena ;
Vairam, Prasanna Karthik ;
Raman, Shankar ;
Kamakoti, V. .
COMPUTER COMMUNICATIONS, 2020, 150 :438-454
[6]   Unsupervised learning with hierarchical feature selection for DDoS mitigation within the ISP domain [J].
Ko, Ili ;
Chambers, Desmond ;
Barrett, Enda .
ETRI JOURNAL, 2019, 41 (05) :574-584
[7]   Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing [J].
Pillutla, Harikrishna ;
Arjunan, Amuthan .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (04) :1547-1559
[8]   Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET [J].
Poongodi, M. ;
Bose, S. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (04) :1549-1559
[9]   DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications [J].
Praseed, Amit ;
Thilagam, P. Santhi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01) :661-685
[10]  
Roshanbin N, 2013, J WEB ENG, V12, P1