SHoM: A Mental-Synthesis Trust Management Model for Mitigating Botnet-Driven DDoS Attacks in the Internet of Things
- URL: http://arxiv.org/abs/2507.21178v2
- Date: Wed, 30 Jul 2025 08:57:59 GMT
- Title: SHoM: A Mental-Synthesis Trust Management Model for Mitigating Botnet-Driven DDoS Attacks in the Internet of Things
- Authors: Masoud Hayeri Khyavi,
- Abstract summary: DDoS attacks pose a severe risk to the security of IoT.<n>We offer a Model for dealing with DDOS attacks on botnets in the Internet of Things via trust management.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The advantages of IoT in strengthening commercial, industrial, and social ecosystems have led to its widespread expansion. Nevertheless, because endpoint devices have limited computation, storage, and communication capabilities, the IoT infrastructure is vulnerable to several cyber threats. As a result, DDoS attacks pose a severe risk to the security of IoT. By taking advantage of these weaknesses, attackers may quickly employ IoT devices as a component of botnets to execute DDoS attacks. The most critical development is how more armies of robots are being constructed from IoT devices. We offer a Model for dealing with DDOS attacks on botnets in the Internet of Things via trust management. In this Model, an attempt has been made to consider all aspects of security concerning trust factors to design a reliable and flexible model against DDoS attacks against the Internet of Things. In the initial studies, about 40-50 security models related to the subject have been studied by using review articles
Related papers
- How To Mitigate And Defend Against DDoS Attacks In IoT Devices [0.0]
This paper analyzes the nature and impact of DDoS attacks such as those launched by the Mirai botnet.<n>It proposes layered mitigation strategies tailored to IoT environments.<n>The paper aims to help engineers and researchers understand and implement practical countermeasures to protect IoT infrastructures.
arXiv Detail & Related papers (2025-07-15T22:21:19Z) - CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment [45.86654759872101]
Cyber-physical systems (CPSs) have experienced a significant technological evolution and increased connectivity, at the cost of greater exposure to cyber-attacks.<n>We propose CyFence, a novel architecture that improves the resilience of closed-loop control systems against cyber-attacks by adding a semantic check.<n>We evaluate CyFence considering a real-world application, consisting of an active braking digital controller, demonstrating that it can mitigate different types of attacks with a negligible overhead.
arXiv Detail & Related papers (2025-06-12T12:22:45Z) - Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies [49.57278643040602]
Distributed Denial of Service (DDoS) attacks persist as significant threats to online services and infrastructure.<n>This paper offers a comprehensive survey of emerging DDoS attacks and detection strategies over the past decade.
arXiv Detail & Related papers (2025-02-27T11:22:25Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled
IoTs: An Anticipatory Study [37.97034388920841]
Federated edge learning can be essential in supporting privacy-preserving, artificial intelligence (AI)-enabled activities in digital twin 6G-enabled Internet of Things (IoT) environments.
We propose an anticipatory study for poisoning attacks in federated edge learning for digital twin 6G-enabled IoT environments.
arXiv Detail & Related papers (2023-03-21T11:12:17Z) - Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation [7.219077740523682]
Large-scale IoT device networks are susceptible to being hijacked and used as botnets to launch distributed denial of service (DDoS) attacks.
We present a dataset from an urban IoT deployment of 4060 nodes describing their deployment-temporal activity under benign conditions.
We also provide a synthetic DDoS attack generator that injects attack activity into the dataset based on parameters such as number of nodes attacked and duration of attack.
arXiv Detail & Related papers (2021-10-05T06:34:58Z) - A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in
Smart Home Use Case [0.5669790037378093]
We propose a threat modelling approach to analyze and mitigate the botnet attacks in an IoT smart home use case.
The proposed methodology identifies the development-level and application-level threats in smart home use case.
We reticulate the identified threats with botnet attacks.
arXiv Detail & Related papers (2021-01-06T17:28:12Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z) - Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT
Networks [30.68108039722565]
Internet of Things (IoT) devices are susceptible to being compromised and being part of a new type of stealthy Distributed Denial of Service (DDoS) attack, called Mongolian DDoS.
This study proposes a novel anomaly-based Intrusion Detection System (IDS) that is capable of timely detecting and mitigating this emerging type of DDoS attacks.
arXiv Detail & Related papers (2020-06-15T00:54:49Z) - SOM-based DDoS Defense Mechanism using SDN for the Internet of Things [14.58995970729543]
We propose a SOM-based DDoS defense mechanism using software-defined networking (SDN)
The main idea of the mechanism is to deploy a SDN-based gateway to protect the device services in the Internet of things.
arXiv Detail & Related papers (2020-03-15T14:13:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.