An Anomaly Behavior based Detection and Prevention of DoS Attack in IoT Environment

被引:0
|
作者
Kumar, S. Santhosh [1 ]
Kulothungan, K. [1 ]
机构
[1] Anna Univ, Dept Informat Sci & Technol, Madras, Tamil Nadu, India
关键词
IoT; Denial of service; Behavior Analysis; MAC frames and Access Point;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IoT is a predominant technology for the information gathering and sharing for various applications. In IoT, the devices are communicated using IEEE 802.11 and IEEE 802.15.4. Low Power IEEE 802.11 is used as communication protocol for IoT nodes to achieve the higher bandwidth and good coverage range. The MAC Layer protocols are more vulnerable to Denial of Service (DoS) attacks such as de-authentication attack, disassociation attack, injection test, and authentication flood and association flood. IoT environment is necessary to monitor to detect attacks and need to prevent them for incessant services. In this paper, Topology Management Method (TMM) is proposed to prevent the DoS attacks based on behavior analysis. In this approach, the sequence of protocol transitions at MAC layer is interrogated over a period of time. The transitions are monitored and used to check the behavior of the IoT node communications. In addition, Fine grained detection algorithm used to detect the wireless node anomalies at the MAC layer. These techniques provide an efficient detection and prevention in IoT environment.
引用
收藏
页码:287 / 292
页数:6
相关论文
共 50 条
  • [1] An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 713 - 718
  • [2] Novel DoS Attack Detection Based on Trust Mode Authentication for IoT
    Yuvaraj, D.
    Priya, S. Shanmuga
    Braveen, M.
    Krishnan, S. Navaneetha
    Nachiyappan, S.
    Mehbodniya, Abolfazl
    Ahamed, A. Mohamed Uvaze
    Sivaram, M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1505 - 1522
  • [3] Anomaly detection for DOS routing attack by a attack source location method
    HeLiu, A.
    Zhao, B. Yingjun
    Dong, C. Qingkuan
    [J]. 2016 IEEE CHINESE GUIDANCE, NAVIGATION AND CONTROL CONFERENCE (CGNCC), 2016, : 25 - 29
  • [4] Research on DDoS Attack Detection Based on ELM in IoT Environment
    Li, Zhihui
    Wei, Lihong
    Li, Wei
    Wei, Lai
    Chen, Minshi
    Lv, Ming
    Zhi, Xulong
    Wang, Chenguang
    Gao, Nan
    [J]. PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 144 - 148
  • [5] Averaged dependence estimators for DoS attack detection in IoT networks
    Baig, Zubair A.
    Sanguanpong, Surasak
    Firdous, Syed Naeem
    Van Nhan Vo
    Tri Gia Nguyen
    So-In, Chakchai
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 198 - 209
  • [6] IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
    Fadhlillah, Aghnia
    Karna, Nyoman
    Irawan, Arif
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 18 - 22
  • [7] Authentication Flooding DOS Attack Detection and Prevention in 802.11
    Elhigazi, Abdallah
    Abd Razak, Shukor
    Hamdan, Mosab
    Mohammed, Bushra
    Abaker, Ibrahim
    Elsafi, Abubakar
    [J]. 2020 18TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2020, : 325 - 329
  • [8] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [9] Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
    Altulaihan, Esra
    Almaiah, Mohammed Amin
    Aljughaiman, Ahmed
    [J]. SENSORS, 2024, 24 (02)
  • [10] Anomaly detection in WSN IoT (Internet of Things) environment through a consensus-based anomaly detection approach
    Anitha, C. L.
    Sumathi, R.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (20) : 58915 - 58934