A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach

被引:3
作者
Ghali, Abdulrahman Aminu [1 ]
Ahmad, Rohiza [1 ]
Alhussian, Hitham [1 ]
机构
[1] Univ Teknol PETRONAS, Comp & Informat Sci Dept, Seri Iskandar 32610, Perak, Malaysia
关键词
IoT; DDoS; DoS; security challenges; LEACH; INTERNET; SECURITY; THINGS;
D O I
10.3390/electronics10111282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has gained remarkable acceptance from millions of individuals. This is evident in the extensive use of intelligent devices such as smartphones, smart television, speakers, air conditioning, lighting, and high-speed networks. The general application area of IoT includes industries, hospitals, schools, homes, sports, oil and gas, automobile, and entertainment, to mention a few. However, because of the unbounded connection of IoT devices and the lack of a specific method for overseeing communication, security concerns such as distributed denial of service (DDoS), denial of service (DoS), replay, botnet, social engineering, man-in-the-middle, and brute force attacks have posed enormous challenges in the IoT environment. Regarding these enormous challenges, this study focuses on DDoS and DoS attacks. These two attacks have the most severe consequences in the IoT environment. The solution proposed in this study can also help future researchers tackle the expansion of IoT security threats. Moreover, the study conducts rigorous experiments to assess the efficiency of the proposed approach. In summary, the experimental results show that the proposed hybrid approach mitigates data exfiltration caused by DDoS and DoS attacks by 95.4%, with average network lifetime, energy consumption, and throughput improvements of 15%, 25%, and 60%, respectively.
引用
收藏
页数:14
相关论文
共 33 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]  
Aldaej A., 2019, IEEE Access, DOI [DOI 10.1109/ACCESS.2019.2893445, 10.1109/ACCESS.2019.2893445]
[3]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[4]  
[Anonymous], 2001, GOV INF Q, V18, P375, DOI [10.1016/S0740-624X(01)00093-4, DOI 10.1016/S0740-624X(01)00093-4]
[5]   Autonomic schemes for threat mitigation in Internet of Things [J].
Ashraf, Qazi Mamoon ;
Habaebi, Mohamed Hadi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 49 :112-127
[6]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[7]   Energy-efficient modified LEACH protocol for IoT application [J].
Behera, Trupti Mayee ;
Samal, Umesh Chandra ;
Mohapatra, Sushanta Kumar .
IET WIRELESS SENSOR SYSTEMS, 2018, 8 (05) :223-228
[8]  
Cooper K., 2015, Security for the Internet of Things
[9]  
De Saint-Exupery A., INTERNET THINGS
[10]  
Essado M., 2012, SPACEOPS 2012 C, P1, DOI DOI 10.1109/EIT.2012.6220698