Effective mitigation against IoTs using super materials for distributed denial of service attacks in cloud computing

被引:2
|
作者
Bhardwaj, Aanshi [1 ]
Mangat, Veenu [1 ]
Vig, Renu [1 ]
机构
[1] Panjab Univ, UIET, Chandigarh 160023, India
关键词
Cloud Computing; DDoS; IoT; Super materials; Mitigation; Behavior based filtering;
D O I
10.1016/j.matpr.2020.04.800
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Computing technology has a key role to play in growing IT services. However, attacks can put the availability of the IT services in danger. One such deadliest attack is IoT based Distributed Denial of Service (DDoS) attacks. The use of super materials like Graphene, Carbon nanotubes, Molybdenum disulfide (MoS2) etc. are revolutionizing the manufacturing of new Internet of Things (IoTs). These super materials are flexible, light weight, high performing and thus allows to expand the range of IoTs. Moreover, the growth of vulnerable IoT devices are increasing at an alarming rate. The bot herders take the control of these vulnerable IoT devices and launch massive DDoS attacks against the cloud systems. This leads to unavailability of the services and economic or reputation losses. A mirai botnet exploited large number of IoT devices and successfully executed the largest DDoS attack of this kind. Hence, it is very important to mitigate these attacks and lower its impact. There are various captcha based strategies (like text based, audio based, video based etc.) for blocking the traffic generated by bots towards the victim. These blocking techniques for mitigation are inflexible, expensive and time consuming. In this paper we propose a novel approach based on gesture verification for effective mitigation of DDoS attacks. The clients are challenged with captcha based on gesture verification. The IoT devices are not capable of making gestures for passing the challenge. Gestures can be simply drawing a circle or a line etc. The IoT devices generating attack are blocked and legitimate users pass the challenge and thus access the services. The proposed method is fast and is less expensive than the state-of-the-art methods. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1359 / 1362
页数:4
相关论文
共 50 条
  • [31] Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine
    Kushwah, Gopal Singh
    Ranga, Virender
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2021, 29 (04) : 1852 - 1870
  • [32] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies
    Alomari, Mariam
    Alsadah, Sharifa
    Aldahmash, Noura
    Alghulaygah, Hana
    Alogaiel, Razan
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
  • [33] Fog Computing as a defensive approach against Distributed Denial of Service (DDoS): a proposed architecture
    Paharia, Bhumika
    Bhushan, Kriti
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [34] Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud
    Vanitha, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 90 - 96
  • [35] Building a Private Cloud Computing and The Analysis against DoS (Denial of Service) attacks Case Study at SMKN 6 Jakarta
    Bahaweres, Rizal Broer
    Sharif, Johan
    Alaydrus, Mudrik
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 233 - 238
  • [36] Analyzing well-known countermeasures against distributed denial of service attacks
    Beitollahi, Hakem
    Deconinck, Geert
    COMPUTER COMMUNICATIONS, 2012, 35 (11) : 1312 - 1332
  • [37] IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks
    Patil, Arvind R. Bhagat
    Thakur, Nileshsingh, V
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 377 - 389
  • [38] Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud
    Lonea, Alina Madalina
    Popescu, Daniela Elena
    Prostean, Octavian
    Tianfield, Huaglory
    SOFT COMPUTING APPLICATIONS, 2013, 195 : 367 - 379
  • [39] A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems
    Mahajan, Nitish
    Chauhan, Amita
    Kumar, Harish
    Kaushal, Sakshi
    Sangaiah, Arun Kumar
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (04) : 1423 - 1443
  • [40] A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems
    Nitish Mahajan
    Amita Chauhan
    Harish Kumar
    Sakshi Kaushal
    Arun Kumar Sangaiah
    Mobile Networks and Applications, 2022, 27 : 1423 - 1443