A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios

被引:58
作者
Dantas Silva, Felipe S. [1 ,2 ]
Silva, Esau [1 ]
Neto, Emidio P. [1 ,2 ]
Lemos, Marcilio [1 ,2 ]
Venancio Neto, Augusto J. [2 ,3 ]
Esposito, Flavio [4 ]
机构
[1] Sci & Technol Rio Grande Norte IFRN, Fed Inst Educ, LaTARC Res Lab IFRN, BR-59015000 Natal, RN, Brazil
[2] Fed Univ Rio Grande Norte UFRN, Dept Informat & Appl Math DIMAp, BR-59078970 Natal, RN, Brazil
[3] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[4] St Louis Univ, Dept Comp Sci, St Louis, MO 63103 USA
基金
美国国家科学基金会; 欧盟地平线“2020”;
关键词
Distributed Denial of Service Attacks (DDoS); Software-Defined Networking (SDN); Internet of Things (IoT); taxonomy; revision; state-of-the-art; DEFENSE-MECHANISMS; INTERNET; SECURITY; THINGS; FRAMEWORK; ARCHITECTURE; MIRAI;
D O I
10.3390/s20113078
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing.
引用
收藏
页数:28
相关论文
共 82 条
[1]  
Aleesa A., 2019, NEURAL COMPUT APPL, V1, P32
[2]  
[Anonymous], 2016, IEEE COMMUN SURV TUT, DOI DOI 10.1109/COMST.2015.2487361
[3]  
[Anonymous], 2019, J NETW COMPUT APPL, DOI DOI 10.1016/j.jnca.2019.06.019
[4]  
[Anonymous], 2018, INT J NETW MANAG, DOI DOI 10.1002/NEM.2038
[5]  
[Anonymous], 2019, T EMERG TELECOMMUN T, DOI DOI 10.1002/ett.3741
[6]  
[Anonymous], 2017, TENCON IEEE REGION, DOI DOI 10.1109/TENCON.2017.8228200
[7]  
[Anonymous], 2020, TELECOMMUN SYST, DOI DOI 10.1007/s11235-019-00599-z
[8]  
[Anonymous], 2016, 2016 IEEE 4 INT C, DOI DOI 10.1109/FiCloud.2016.30
[9]  
[Anonymous], 2017, IEEE ACCESS, DOI DOI 10.1109/ACCESS.2017.2666270
[10]  
[Anonymous], 2017, 2017 IEEE INT C, DOI DOI 10.1109/CIT.2017.61