Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

被引:4
|
作者
Arnaboldi, Luca [1 ]
Morisset, Charles [1 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne, Tyne & Wear, England
来源
关键词
MODEL;
D O I
10.1007/978-3-319-68063-7_16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Denial of Service (DoS) attacks constitute a major security threat to today's Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing 'Crypto Puzzles' - a DoS mitigation technique. We created an imitation of a DoS attack on the system, and conducted a quantitative analysis to simulate the impact such an attack may potentially exert upon the system, assessing the trade off between security and throughput in the IoT system. We model this through stochastic model checking in PRISM and provide evidence that supports this as a valuable method to compare the efficiency of different implementations of IoT systems, exemplified by a case study.
引用
收藏
页码:224 / 233
页数:10
相关论文
共 50 条
  • [1] Client Puzzles Based on Quasi Partial Collisions Against DoS Attacks in UMTS
    Lei, Yaohui
    Pierre, Samuel
    Quintero, Alejandro
    [J]. 2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 2464 - 2468
  • [2] Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols
    Tritilanunt, Suratose
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 358 - 365
  • [3] Revisiting Client Puzzles for State Exhaustion Attacks Resilience
    Noureddine, Mohammad A.
    Fawaz, Ahmed M.
    Hsu, Amanda
    Guldner, Cody
    Vijay, Sameer
    Basar, Tamer
    Sanders, William H.
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 617 - 629
  • [4] The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    [J]. INFORMATICA, 2016, 27 (01) : 31 - 48
  • [5] Modeling DoS Attacks in WSNs with Quantitative Games
    Monnet, Quentin
    Sassolas, Mathieu
    Mokdad, Lynda
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [6] Detecting DoS attacks on SIP systems
    Chen, Eric Y.
    [J]. VoIP MaSe 06: 1st IEEE Workshop on VoIP Management and Security: SECURING AND MANAGING VOIP COMMUNICATIONS, 2006, : 53 - 58
  • [7] Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks
    Anirudh, M.
    Thileeban, Arul S.
    Nallathambi, Daniel Jeswin
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), 2017, : 11 - 14
  • [8] Mitigating DoS attacks in publish-subscribe IoT networks
    Chifor, Bogdan-Cosmin
    Bica, Ion
    Patriciu, Victor-Valeriu
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [9] Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT
    Arnaboldi, Luca
    Morisset, Charles
    [J]. SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS, 2018, 11176 : 130 - 145
  • [10] Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks
    Hristozov, Stefan
    Huber, Manuel
    Sigl, Georg
    [J]. PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 316 - 327