Design and Development of IOT Testbed with DDoS Attack for Cyber Security Research

被引:13
作者
Arthi, R. [1 ]
Krishnaveni, S. [2 ]
机构
[1] SRM IST, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM IST, Dept Software Engn, Chennai, Tamil Nadu, India
来源
ICSPC'21: 2021 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICPSC) | 2021年
关键词
IOT; DDOS; DNS Attack; Testbed for IOT;
D O I
10.1109/ICSPC51351.2021.9451786
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) is clubbed by networking of sensors and other embedded electronics. As more devices are getting connected, the vulnerability of getting affected by various IoT threats also increases. Among the IoT threads, DDoS attacks are causing serious issues in recent years. In IoT, these attacks are challenging to detect and isolate. Thus, an effective Intrusion Detection System (IDS) is essential to defend against these attacks. The traditional IDS is based on manual blacklisting. These methods are time-consuming and will not be effective to detect novel intrusions. At present, IDS are automated and programmed to be dynamic which are aided by machine learning & deep learning models. The performance of these models mainly depends on the data used to train the model. Majority of IDS study is performed with non-compatible and outdated datasets like KDD 99 and NSL KDD. Research on specific DDoS attack datasets is very less. Therefore, in this paper, we first aim to examine the effect of existing datasets in the IoT environment. Then, we propose a real-time data collection framework for DNS amplification attacks in IoT. The generated network packets containing DDoS attack is captured through port mirroring.
引用
收藏
页码:586 / 590
页数:5
相关论文
共 15 条
[1]  
[Anonymous], 2009, 2009 IEEE S COMP INT
[2]  
[Anonymous], 2015, International Journal of Advanced Research in Computer and Communication Engineering
[3]  
Cunningham R.K., 1999, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB
[4]   Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Moschoyiannis, Sotiris ;
Janicke, Helge .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
[5]  
Guravaiah, 2020, 2020 IEEE 15 INT C I
[6]   Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling [J].
Jazi, Hossein Hadian ;
Gonzalez, Hugo ;
Stakhanova, Natalia ;
Ghorbani, Ali A. .
COMPUTER NETWORKS, 2017, 121 :25-36
[7]   Ensemble approach for network threat detection and classification on cloud computing [J].
Krishnaveni, S. ;
Prabakaran, S. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (03)
[8]   Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing [J].
Krishnaveni, S. ;
Sivamohan, S. ;
Sridhar, S. S. ;
Prabakaran, S. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03) :1761-1779
[9]  
Krishnaveni S, 2016, INDIAN J SCI TECHNOL, V9
[10]  
Krishnaveni S., 2018, Journal of Computational and Theoretical Nanoscience, V15, P2956, DOI [10.1166/jctn.2018.7572, DOI 10.1166/JCTN.2018.7572]