Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT
Networks
- URL: http://arxiv.org/abs/2006.08064v1
- Date: Mon, 15 Jun 2020 00:54:49 GMT
- Title: Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT
Networks
- Authors: Keval Doshi, Yasin Yilmaz and Suleyman Uludag
- Abstract summary: Internet of Things (IoT) devices are susceptible to being compromised and being part of a new type of stealthy Distributed Denial of Service (DDoS) attack, called Mongolian DDoS.
This study proposes a novel anomaly-based Intrusion Detection System (IDS) that is capable of timely detecting and mitigating this emerging type of DDoS attacks.
- Score: 30.68108039722565
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Internet of Things (IoT) networks consist of sensors, actuators, mobile and
wearable devices that can connect to the Internet. With billions of such
devices already in the market which have significant vulnerabilities, there is
a dangerous threat to the Internet services and also some cyber-physical
systems that are also connected to the Internet. Specifically, due to their
existing vulnerabilities IoT devices are susceptible to being compromised and
being part of a new type of stealthy Distributed Denial of Service (DDoS)
attack, called Mongolian DDoS, which is characterized by its widely distributed
nature and small attack size from each source. This study proposes a novel
anomaly-based Intrusion Detection System (IDS) that is capable of timely
detecting and mitigating this emerging type of DDoS attacks. The proposed IDS's
capability of detecting and mitigating stealthy DDoS attacks with even very low
attack size per source is demonstrated through numerical and testbed
experiments.
Related papers
- Principles of Designing Robust Remote Face Anti-Spoofing Systems [60.05766968805833]
This paper sheds light on the vulnerabilities of state-of-the-art face anti-spoofing methods against digital attacks.
It presents a comprehensive taxonomy of common threats encountered in face anti-spoofing systems.
arXiv Detail & Related papers (2024-06-06T02:05:35Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Synthesis of Adversarial DDOS Attacks Using Tabular Generative
Adversarial Networks [0.0]
New types of attacks stand out as the technology of attacks keep evolving.
One of these attacks are the attacks based on Generative Adversarial Networks (GAN) that can evade machine learning IDS leaving them vulnerable.
This project investigates the impact of the Adversarial Attacks synthesized using real DDoS attacks generated using GANs on the IDS.
arXiv Detail & Related papers (2022-12-14T18:55:04Z) - Zero-day DDoS Attack Detection [0.0]
This project aims to solve the task of detecting zero-day DDoS attacks by utilizing network traffic that is captured before entering a private network.
Modern feature extraction techniques are used in conjunction with neural networks to determine if a network packet is either benign or malicious.
arXiv Detail & Related papers (2022-08-31T17:14:43Z) - NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS
Attack Detection in IoT Domains [0.13999481573773068]
This study proposes NFDLM, a lightweight and optimised Artificial Neural Network (ANN) based Distributed Denial of Services (DDoS) attack detection framework.
Overall, the detection performance achieves approximately 99% accuracy for the detection of attacks from botnets.
arXiv Detail & Related papers (2022-07-15T14:09:08Z) - Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation [7.219077740523682]
Large-scale IoT device networks are susceptible to being hijacked and used as botnets to launch distributed denial of service (DDoS) attacks.
We present a dataset from an urban IoT deployment of 4060 nodes describing their deployment-temporal activity under benign conditions.
We also provide a synthetic DDoS attack generator that injects attack activity into the dataset based on parameters such as number of nodes attacked and duration of attack.
arXiv Detail & Related papers (2021-10-05T06:34:58Z) - CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an
In-Vehicle CAN Bus Based on Deep Features of Voltage Signals [48.813942331065206]
We propose a security hardening system for in-vehicle networks.
The proposed system includes two mechanisms that process deep features extracted from voltage signals measured on the CAN bus.
arXiv Detail & Related papers (2021-06-15T06:12:33Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.