Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment

Author(s):  
Abdulrahman Aminu Ghali ◽  
Rohiza Ahmad ◽  
Hitham Seddiq Alhassan Alhussian
2018 ◽  
Vol 2018 ◽  
pp. 1-30 ◽  
Author(s):  
Michele De Donno ◽  
Nicola Dragoni ◽  
Alberto Giaretta ◽  
Angelo Spognardi

The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.


Author(s):  
Siva Kumar Kotamraju ◽  
Peda Gopi Arepalli ◽  
Lakshman Narayana Vejendla ◽  
Satya Sandeep Kanumalli

2019 ◽  
Vol 130 ◽  
pp. 1-13 ◽  
Author(s):  
Gang Liu ◽  
Wei Quan ◽  
Nan Cheng ◽  
Hongke Zhang ◽  
Shui Yu

Sensors ◽  
2018 ◽  
Vol 18 (6) ◽  
pp. 1920 ◽  
Author(s):  
Juanli Li ◽  
Jiacheng Xie ◽  
Zhaojian Yang ◽  
Junjie Li

2014 ◽  
Vol 513-517 ◽  
pp. 1915-1918
Author(s):  
Heng Wang ◽  
Bi Geng Zheng

As one of the freshest technologies nowadays, the development of Internet of Things is attracting more and more concerns. Internet of Things is able to connect all the items to Internet via information technology such as RFID and Wireless Sensor Network, in order to realize intelligent identification and management. It is supposed in Internet of Things environments, satisfactory services can be provided through any devices or any networks, whenever it is demanded. It makes that not only PC device but also other small devices with intelligence can be connected to the same network. As a result, It is much more convenient for people to obtain real-time information and then to take corresponding actions.


Sign in / Sign up

Export Citation Format

Share Document