Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA)

  • Original Contribution
  • Published:
Journal of The Institution of Engineers (India): Series B Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is an ever expanding discipline encompassing all orbits of life, and its development has resulted in enormous benefits. IoT has made it possible for simple electronic objects to participate in the Internet. However, the growth of IoT has also resulted in considerable security issues. Devices that build up an IoT network have constrained resources and battery power making it difficult to incorporate a proper security mechanism in an IoT environment. The devices in IoT are vulnerable to numerous threats, and the volume of these threats is ever increasing. Distributed Denial of Service (DDoS) is one of the attacks that have gained momentum with the growth of IoT. DDoS not only influences IoT network, but IoT botnets can also be used to launch voluminous DDoS attacks. Although numerous lightweight security protocols and mechanisms have been designed for improvement of security scenario in IoT networks, most of the security concerns are yet to be assuaged. In this paper, we propose a Software-Defined Network (SDN)-based security mechanism, for detection and alleviation of DDoS in IoT networks. SDN is a flexible method of managing and controlling a network that segregates data and control planes. It makes networks programmable which can be used to develop an efficient method to deal with catastrophic attacks in IoT networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. A. Rayes, S. Salam, Internet of Things-from Hype to Reality: The Road to Digitization (2016)

  2. I. Yaqoob et al., Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun. 24(3), 10–16 (2017)

    Article  Google Scholar 

  3. L. Atzori, A. Iera, G. Morabito, From ‘smart objects’ to ‘social objects’: the next evolutionary step of the internet of things. IEEE Commun. Mag. 52(1), 97–105 (2014)

    Article  Google Scholar 

  4. A. Remke, B.R. Haverkort, Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, vol. 9629 (2016), pp. 1–4

  5. M. De Donno, N. Dragoni, A. Giaretta, A. Spognardi, Analysis of DDoS-Capable IoT Malwares, vol. 11 (2017), pp. 807–816

  6. J. Wei, DDoS on Internet of Things—a Big Alarm for the Future (2016)

  7. P. Paganini, 150,000 IoT Devices behind the 1Tbps DDoS attack on OVHSecurity Affairs, 2016-09-27 (2016), https://securityaffairs.co/wordpress/51726/cyber-crime/ovh-hit-botnet-iot.html. Accessed 27 Mar 2018

  8. G. Corfield, Security man Krebs’ website DDoS was powered by hacked Internet of Things botnet • The Register (2016), https://www.theregister.co.uk/2016/09/26/brian_krebs_site_ddos_was_powered_by_hacked_internet_of_things_botnet. Accessed 27 Mar 2018

  9. J. Malik, Threats Converge: IoT Meets Ransomware (2017). https://www.darkreading.com/vulnerabilities---threats/threats-converge-iot-meets-ransomware/a/d-id/1328304? Accessed 27 Mar 2018

  10. Q. Jing, A.V. Vasilakos, J. Wan, J. Lu, D. Qiu, Security of the Internet of Things: perspectives and challenges. Wirel. Net.works 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  11. W. Azka, S. Revathi, Protocols for Secure Internet of Things. Int. J. Educ. Manag. Eng. 7(2), 20–29 (2017)

    Article  Google Scholar 

  12. P. Goransson, C. Black, T. Culver, Software Defined Networks: A Comprehensive Approach (2016)

  13. M.C. Dacier, H. Konig, R. Cwalinski, F. Kargl, S. Dietrich, Security challenges and opportunities of software-defined networking. IEEE Secur. Priv. 15(2), 96–100 (2017)

    Article  Google Scholar 

  14. J. Kim et al., Standard-based IoT platforms interworking: Implementation, experiences, and lessons learned. IEEE Commun. Mag. 54(7), 48–54 (2016)

    Article  Google Scholar 

  15. Á.L. Valdivieso Caraguay, A. Benito Peral, L.I. Barona López, L.J. García Villalba, SDN: evolution and opportunities in the development IoT applications. Int. J. Distrib. Sens. Netw. 10, 735142 (2014)

    Article  Google Scholar 

  16. M. Sheikhan, H. Bostani, A hybrid Intrusion Detection System for Internet of Things, in 8th Symp. Telecommun., no. 3 (2016), pp. 2395–4396

  17. O. Salman, I. Elhajj, A. Chehab, A. Kayssi, Software Defined IoT security framework, in 2017 4th Int. Conf. Softw. Defin. Syst. SDS 2017 (2017), pp. 75–80

  18. M. Miettinen et al., IoT sentinel demo: automated device-type identification for security enforcement in IoT, in Proc. - Int. Conf. Distrib. Comput. Syst. (2017), pp. 2511–2514

  19. P.K. Sharma, S. Singh, Y.S. Jeong, J.H. Park, DistBlockNet: a distributed blockchains-based secure SDN architecture for IoT networks. IEEE Commun. Mag. 55(9), 78–85 (2017)

    Article  Google Scholar 

  20. C. Li, Z. Qin, E. Novak, Q. Li, Securing SDN infrastructure of IoT-Fog networks from MitM attacks. IEEE Internet Things J. 4(5), 1156–1164 (2017)

    Article  Google Scholar 

  21. T. Xu, D. Gao, P. Dong, H. Zhang, C.H. Foh, H.C. Chao, Defending against new-flow attack in SDN-based Internet of Things. IEEE Access 5, 3431–3443 (2017)

    Article  Google Scholar 

  22. T. Kawamura, M. Fukushi, Y. Hirano, Y. Fujita, Y. Hamamoto, An NTP-based detection module for DDoS attacks on IoT, in 2017 IEEE Int. Conf. Consum. Electron. - Taiwan, ICCE-TW 2017 (2017), pp. 15–16

  23. Y.M.P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, C. Rossow, IoTPOT: a novel honeypot for revealing current IoT threats. J. Inf. Process. 24(3), 522–533 (2016)

    Google Scholar 

  24. S.D. Odabasi, M.S. Haskırış, Internet of Things (IoT), security and Distributed Denial of Service (DDoS) attack, in 1st Int. Mediterr. Sci. Eng. Congr. (IMSEC-2016); Congr. Center, Çukurova Univ. Adana, Turkey, no. October 2016 (2016), pp. 4934–4938

  25. P. Bull, R. Austin, E. Popov, M. Sharma, R. Watson, Flow based security for IoT devices using an SDN gateway, in Proc. - 2016 IEEE 4th Int. Conf. Futur. Internet Things Cloud, FiCloud 2016 (2016), pp. 157–163

  26. M. De Donno, N. Dragoni, A. Giaretta, M. Mazzara, AntibIoTic: protecting IoT devices against DDoS attacks. Adv. Intell. Syst. Comput. 717, 59–72 (2018)

    Google Scholar 

  27. C. Zhang, R. Green, Communication security in Internet of Thing: preventive measure and avoid DDoS attack over IoT network, in Proc. 18th Symp. Commun. Netw., no. January 2015 (2015), pp. 8–15

  28. W. Azka, S. Revathi, A. Geetha, A Survey of Applications and Security Issues in Software Defined Networking, no. March (2017), pp. 21–28

  29. SDN/OpenFlow|Flowgrammable: https://flowgrammable.org/sdn/openflow/ (2015). Accessed 27 Mar 2018

  30. S.K. Tayyaba, M.A. Shah, O.A. Khan, A.W. Ahmed, Software Defined Network (SDN) based Internet of Things (IoT): a road ahead, in Proc. Int. Conf. Futur. Networks Distrib. Syst. (2017), pp. 15:1–15:8

  31. P.C. Vinh, V. Alagar, Context-aware systems and applications: 4th international conference, ICCASA 2015 Vung Tau, Vietnam, November 26–27, 2015 revised selected papers 123, Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 165 (2016), pp. 62–72

  32. P. Kasinathan, C. Pastrone, M.A. Spirito, M. Vinkovits, Denial-of-Service detection in 6LoWPAN based Internet of Things, in Int. Conf. Wirel. Mob. Comput. Netw. Commun. (2013), pp. 600–607

  33. L. Galluccio, S. Milardo, G. Morabito, S. Palazzo, SDN-WISE: design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. Proc. IEEE INFOCOM 26, 513–521 (2015)

    Google Scholar 

  34. A.C.G. Anadiotis, L. Galluccio, S. Milardo, G. Morabito, S. Palazzo, Towards a software-defined Network Operating System for the IoT, in IEEE World Forum Internet Things, WF-IoT 2015—Proc. (2015), pp. 579–584

  35. D.K. Bhattacharyya, J.K. Kalita, DDoS ATTACKS, 1st edn. (CRC Press, New York, 2016)

    Book  Google Scholar 

  36. Y. Cui et al., SD-Anti-DDoS: fast and efficient DDoS defense in software-defined networks. J. Netw. Comput. Appl. 68, 65–79 (2016)

    Article  Google Scholar 

  37. D. Georgiadis, M. Kontaki, A. Gounaris, A. Papadopoulos, K. Tsichlas, Y. Manolopoulos, Continuous outlier detection in data streams: an extensible framework and state-of-the-art algorithms, in Proc. 2013 ACM SIGMOD Int. Conf. Manag. Data (2013), pp. 1061–1064

  38. L. Tran, L. Fan, C. Shahabi, Distance-based outlier detection in data streams. Proc. VLDB Endow. 9(12), 1089–1100 (2016)

    Article  Google Scholar 

  39. P. Boyle, Distributed Denial of Service Attack Tools: Trinoo and Wintrinoo (2011)

  40. M. Team, Mininet An Instant Virtual Network on your Laptop (or other PC). https://mininet.org/

  41. M. Nobakht, A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow (2016), pp. 147–156

Download references

Acknowledgements

The authors wish to thank MANF UGC, Govt. of India, for providing financial support under MANF-UGC (MANF-2015-17-JAM-60506) program to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azka Wani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wani, A., Revathi, S. DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA). J. Inst. Eng. India Ser. B 101, 117–128 (2020). https://doi.org/10.1007/s40031-020-00442-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40031-020-00442-z

Keywords

Navigation