DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
DOI: http://dx.doi.org/10.62527/joiv.8.4.2175
Abstract
Keywords
Full Text:
PDFReferences
L. W. Santoso, R. Lim, and K. Trisnajaya, “Smart home system using Internet of Things,” Journal of Information and Communication Convergence Engineering, vol. 16, no. 1, pp. 60–65, Mar. 2018, doi:10.6109/jicce.2018.16.1.60.
M. M. Pillai and A. S. Helberg, “Improving Security in Smart Home Networks through user-defined device interaction rules,” 2021 IEEE AFRICON, pp. 1–6, 2021.
M. Ngwenya and M. Ngoepe, “A framework for data security, privacy, and trust in ‘consumer internet of things’ assemblages in South Africa,” Security and Privacy, vol. 3, no. 5, Jul. 2020, doi:10.1002/spy2.122.
S. Aziz and S. N. C. M. Nasir, “Internet of things (IoT) and smart home technology in Malaysia: Issues and challenges for research in adoption IoT and latest technology for home building,” Proceedings of 8th International Conference on Advanced Materials Engineering & Technology (ICAMET 2020), vol. 2347, p. 020094, 2021, doi:10.1063/5.0053680.
O. Toutsop, S. Das, and K. Kornegay, “Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks,” 2021. [Online]. Available: https://ssrn.com/abstract=3897894
S. Bahizad, “Risks of Increase in the IoT Devices,” 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Aug. 2020, doi:10.1109/cscloud-edgecom49738.2020.00038.
S. Sotoudeh, S. Hashemi, and H. Gharaee Garakani, “Security Framework of IoT-Based Smart Home,” 2020. Accessed: Apr. 15, 2024. [Online]. Available: chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://ijict.itrc.ac.ir/article-1-450-en.pdf
A. K. Ray and A. Bagwari, “IoT based Smart home: Security Aspects and security architecture,” 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), pp. 218–222, Apr. 2020, doi: 10.1109/csnt48778.2020.9115737.
L. Ma, Z. Li, and M. Zheng, “A Research on IoT Based Smart Home,” 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), pp. 120–122, Apr. 2019, doi:10.1109/icmtma.2019.00033.
S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir, and M. Imran, “Investigating Smart Home Security: Is Blockchain the Answer?,” IEEE Access, vol. 8, pp. 117802–117816, 2020, doi:10.1109/access.2020.3004662.
B. Tushir, Y. Dalal, B. Dezfouli, and Y. Liu, “A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6282–6292, Apr. 2021, doi: 10.1109/jiot.2020.3026023.
P. Vennam, P. T. C., T. B. M., Y.-G. Kim, and P. K. B. N., “Attacks and Preventive Measures on Video Surveillance Systems: A Review,” Applied Sciences, vol. 11, no. 12, p. 5571, Jun. 2021, doi:10.3390/app11125571.
X. Liang and T. Znati, “An empirical study of intelligent approaches to DDoS detection in large scale networks,” 2019 International Conference on Computing, Networking and Communications (ICNC), pp. 821–827, Feb. 2019, doi: 10.1109/iccnc.2019.8685519.
M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, “A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1191–1221, 2020, doi:10.1109/comst.2019.2962586.
W. Sun, Y. Li, and S. Guan, “An Improved Method of DDoS Attack Detection for Controller of SDN,” 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET), pp. 249–253, Aug. 2019, doi:10.1109/ccet48361.2019.8989356.
R. Sanjeetha, P. Benoor, and A. Kanavalli, “Mitigation of DDoS attacks in Software Defined Networks at application level,” 2019 PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS), pp. 1–3, Aug. 2019, doi:10.1109/phdedits47523.2019.8986960.
B. B. Gupta, A. Gaurav, K. T. Chui, and C.-H. Hsu, “Identity-Based Authentication Technique for IoT Devices,” 2022 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–4, Jan. 2022, doi:10.1109/icce53296.2022.9730173.
R. Arthi and S. Krishnaveni, “Design and Development of IOT Testbed with DDoS Attack for Cyber Security Research,” 2021 3rd International Conference on Signal Processing and Communication (ICPSC), pp. 586–590, May 2021, doi:10.1109/icspc51351.2021.9451786.
E. D. Alalade, “Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach,” 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), Jun. 2020, doi: 10.1109/wf-iot48130.2020.9221151.
F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, and G. A. Shah, “IoT DoS and DDoS Attack Detection using ResNet,” 2020 IEEE 23rd International Multitopic Conference (INMIC), Nov. 2020, doi: 10.1109/inmic50486.2020.9318216.
N., K. H. Zaboon, and A. A. Abdullah, “A Review of the Common DDoS Attack: Types and Protection Approaches Based on Artificial Intelligence,” Fusion: Practice and Applications, pp. 08–14, 2021, doi:10.54216/fpa.070101.
J.-P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Ethical hacking for IoT: Security issues, challenges, solutions and recommendations,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 280–308, 2023, doi: 10.1016/j.iotcps.2023.04.002.
M. R. Alam, M. B. I. Reaz, and M. A. M. Ali, “A Review of Smart Homes—Past, Present, and Future,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 42, no. 6, pp. 1190–1203, Nov. 2012, doi: 10.1109/tsmcc.2012.2189204.
J. M. Blythe and S. D. Johnson, “The Consumer Security Index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices,” Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 4 (7 pp.)-4 (7 pp.), 2018, doi: 10.1049/cp.2018.0004.
N. Gadkar and A. Deshmukh, “Classifications on IoT Attacks,” 2018. [Online]. Available: https://iotanalytics.com/inter
Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments,” Energy Reports, vol. 7, pp. 8176–8186, Nov. 2021, doi:10.1016/j.egyr.2021.08.126.
K. Huang, L.-X. Yang, X. Yang, Y. Xiang, and Y. Y. Tang, “A Low-Cost Distributed Denial-of-Service Attack Architecture,” IEEE Access, vol. 8, pp. 42111–42119, 2020, doi:10.1109/access.2020.2977112.
K. Somasundaram and K. Selvam, “IOT – Attacks and Challenges,” International Journal of Engineering and Technical Research, vol. 8, no. 9, Apr. 2018.
I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of Things: Security vulnerabilities and challenges,” 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187, Jul. 2015, doi: 10.1109/iscc.2015.7405513.
E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions,” Electronics, vol. 11, no. 20, p. 3330, Oct. 2022, doi: 10.3390/electronics11203330.