Novel approach for detection of IoT generated DDoS traffic

被引:51
作者
Cvitic, Ivan [1 ]
Perakovic, Dragan [1 ]
Perisa, Marko [1 ]
Botica, Mate [2 ]
机构
[1] Univ Zagreb, Fac Transport & Traff Sci, Vukeliceva 4, Zagreb 10000, Croatia
[2] OiV Transmitters & Commun Ltd, Ul Grada Vukovara 269d, Zagreb 10000, Croatia
关键词
Denial of service; Smart office IoT; Machine learning; Traffic patterns; Traffic features; INTERNET;
D O I
10.1007/s11276-019-02043-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of detecting anomalies in network traffic caused by the distributed denial of service (DDoS) attack so far has mainly been investigated in terms of detection of illegitimate DDoS traffic generated by conventional terminal devices (PCs, laptops, mobile devices, tablets, servers). Technological development has resulted in the emergence of the Internet of Things (IoT) concept, whose implementation implies numerous terminal devices with a low level of implemented protection. The large growth and prediction of future growth is noticeable in the environment of a smart home and smart office. IoT devices in such environments are increasingly being used as a platform for generating DDoS traffic due to its numeracy and low level of protection. The aim of this research is to propose a novel approach for detection of DDoS traffic generated by IoT devices in a form of conceptual network anomaly detection model. Proposed conceptual model is based on device classes which are dependent on individual device traffic characteristics.
引用
收藏
页码:1573 / 1586
页数:14
相关论文
共 46 条
  • [1] INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES
    Ahmed, Ejaz
    Yaqoob, Ibrar
    Gani, Abdullah
    Imran, Muhammad
    Guizani, Mohsen
    [J]. IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 10 - 16
  • [2] IoT Traffic Management and Integration in the QoS Supported Network
    Al-Shammari, Basim K. J.
    Al-Aboody, Nadia
    Al-Raweshidy, Hamed S.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 352 - 370
  • [3] Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
    Ali, Bako
    Awad, Ali Ismail
    [J]. SENSORS, 2018, 18 (03):
  • [4] LTE/LTE-A Random Access for Massive Machine-Type Communications in Smart Cities
    Ali, Md Shipon
    Hossain, Ekram
    Kim, Dong In
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) : 76 - 83
  • [5] A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)
    Almusaylim, Zahrah A.
    Zaman, Noor
    [J]. WIRELESS NETWORKS, 2019, 25 (06) : 3193 - 3204
  • [6] Amar Y., 2018, ARXIV180305368
  • [7] Agency, simulation and self-identification
    Jeannerod, M
    Pacherie, E
    [J]. MIND & LANGUAGE, 2004, 19 (02) : 113 - 146
  • [8] [Anonymous], 2013, INT J COMPUT NETW CO
  • [9] Bhardwaj K., 2018, USENIX WORKSH HOT TO
  • [10] Bhattacharyya DK, 2016, DDOS ATTACKS: EVOLUTION, DETECTION, PREVENTION, REACTION, AND TOLERANCE, P1, DOI 10.1201/b20614