Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things

被引:31
|
作者
Borgiani, Vladimir [1 ]
Moratori, Patrick [2 ]
Kazienko, Juliano F. [3 ]
Tubino, Emilio R. R. [4 ]
Quincozes, Silvio E. [2 ]
机构
[1] Fluminense Fed Univ, Dept Prod Engn & Comp Syst, BR-28895532 Rio Das Ostras, Brazil
[2] Fluminense Fed Univ, Dept Comp Sci, BR-24210310 Niteroi, RJ, Brazil
[3] Univ Fed Santa Maria, Ind Tech Coll, BR-97105900 Santa Maria, RS, Brazil
[4] Pampa Fed Univ, Dept Comp Sci, BR-96460000 Alegrete, Brazil
关键词
Wireless sensor networks; IP networks; Monitoring; Power demand; Denial of Service (DoS); detection; distribution; duty-cycling; Industrial Internet of Things (IIoT); mitigation;
D O I
10.1109/JIOT.2020.3028652
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are commonly adopted by the Industrial Internet-of-Things (IIoT) scenarios due to their easy and fast deployment. However, WSNs are especially vulnerable to security attacks as reflexive packet flooding Denial of Service (DoS) may occur. Admission control and reputation-based strategies are effective for attack detection. However, mitigation strategies to deal with the effects of these attacks, such as congestion channel transmission is an open issue. Additionally, the resource-constrained nature of nodes, such as the low bandwidth, limited memory, and battery within WSNs, poses a challenge to develop efficient mechanisms in such a scenario. To address this issue, we propose a distributed congestion control by duty-cycle restriction (D-ConCReCT) to detect and mitigate DoS in IIoT. The main goal is to investigate its feasibility in large-scale networks, as well as its ability to reduce both the detection and mitigation times when compared to a previous centralized approach, the so-called congestion control by duty-cycle restriction (ConCReCT). Our results indicate that D-ConCReCT may be applied in the mitigation of DoS attacks in a sensor network scenario with 500 nodes.
引用
收藏
页码:4569 / 4578
页数:10
相关论文
共 50 条
  • [1] Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
    Aswad, Firas Mohammed
    Ahmed, Ali Mohammed Saleh
    Alhammadi, Nafea Ali Majeed
    Khalaf, Bashar Ahmad
    Mostafa, Salama A.
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [2] Detection and Mitigation of Denial of Service Attacks in Internet of Things Networks
    Sanli, Mustafa
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (9) : 12629 - 12639
  • [3] Sophistication in distributed denial-of-service attacks on the Internet
    Kumar, VA
    [J]. CURRENT SCIENCE, 2004, 87 (07): : 885 - 888
  • [4] Internet of Things and Distributed Denial of Service Mitigation
    Ali, Mohammed AlSaudi
    Motawa, Dyaa
    Al-Harby, Fahad
    [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 26 - 36
  • [5] Protecting the Internet from distributed denial-of-service attacks: A proposal
    Crocker, SD
    [J]. PROCEEDINGS OF THE IEEE, 2004, 92 (09) : 1375 - 1381
  • [6] Collaborative Detection and Mitigation of Distributed Denial-of-Service Attacks on Software-Defined Network
    Tayfour, Omer Elsier
    Marsono, Muhammad Nadzir
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (04): : 1338 - 1347
  • [7] Collaborative Detection and Mitigation of Distributed Denial-of-Service Attacks on Software-Defined Network
    Omer Elsier Tayfour
    Muhammad Nadzir Marsono
    [J]. Mobile Networks and Applications, 2020, 25 : 1338 - 1347
  • [8] Denial-of-service attacks rip the Internet
    Garber, L
    [J]. COMPUTER, 2000, 33 (04) : 12 - 17
  • [9] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [10] Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 374 - 390