Distributed denial of service attacks and its defenses in IoT: a survey
- PDF / 1,128,752 Bytes
- 44 Pages / 439.37 x 666.142 pts Page_size
- 85 Downloads / 182 Views
Distributed denial of service attacks and its defenses in IoT: a survey Mikail Mohammed Salim1 · Shailendra Rathore1 · Jong Hyuk Park1
© Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract A distributed denial of service (DDoS) attack is an attempt to partially or completely shut down the targeted server with a flood of internet traffic. The primary aim of this attack is to disrupt regular traffic flow to the victim’s server or network. DDoS attacks are volumetric attacks, and non-legacy IoT devices with low security such as webcams, baby monitoring devices and printers are compromised to form a botnet. High traffic from compromised IoT devices is rerouted to servers to disrupt their regular services. DDoS attacks are to an extent covered in the research literature. However, existing research do not discuss all DDoS attacks on general servers and botnet attacks on IoT devices and suggest few detection and mitigation solutions which are limited to addressing attacks on the cloud environment. Existing survey focuses either on the cloud layer or the IoT layer. A complete survey of DDoS attacks for both IoT and the cloud environment is not present in the current literature. Our survey is a comprehensive approach which includes general DDoS attack motivations and specific reasons why attackers prefer IoT devices to launch DDoS attacks. Various attack methods to compromise IoT devices and tools used to deploy botnet-infected IoT devices for DDoS attacks on the cloud layer are presented. A detailed attack classification on IoT devices and the cloud environment is presented considering that IoT devices are first compromised and then used by attackers against their primary targets on the cloud layer. Various state-of-the-art defense measures in the current literature for defense against DDoS attacks are present. Suggestions to implement an essential first line of defense for IoT devices are suggested. Our paper, to the best of our knowledge, is first to provide a holistic study of DDoS attacks from IoT devices to the cloud environment. Keywords Distributed denial of service attacks · Security detection · Security prevention and mitigation · Internet of things · Security and privacy · Cloud computing · Edge computing
* Jong Hyuk Park [email protected] Extended author information available on the last page of the article
13
Vol.:(0123456789)
M. M. Salim et al.
1 Introduction Distributed denial of service (DDoS) attacks are a constant threat to cybersecurity since the first attack in 1999 against the University of Minnesota [1]. A bandwidth depletion attack using UDP flooding technique was carried out for 2 days. In 2016, a Web site of a security consultant Brian Krebs and a French Webhost were targeted with an attack traffic of 620 Gbps and 1.1 Tbps, respectively. The attack was named Mirai, a Japanese word which translates to “The Future” [2] using a collection of 600,000 infected IoT devices. With the public release of the Mirai source code, more attacks followed including the famous Dyn
Data Loading...