With an increasing number of Internet of Things (IoT) devices in the digital world, the attack surface for consumer networks has been increasing exponentially. Most of the compromised devices are used as zombies for attacks such as Distributed Denial of Services (DDoS). Consumer networks, unlike most commercial networks, lack the infrastructure such as managed switches and firewalls to easily monitor and block undesired network traffic. To counter such a problem with limited resources, this article proposes a hybrid anomaly detection approach that detects irregularities in the network traffic implicating compromised devices by using only elementary network information like Packet Size, Source, and Destination Ports, Time between subsequent packets, Transmission Control Protocol (TCP) Flags, etc. Essential features can be extracted from the available data, which can further be used to detect zero-day attacks. The paper also provides the taxonomy of various approaches to classify anomalies and description on capturing network packets inside consumer networks.
The development of the Internet of Drones (IoD) becomes vital because of a proliferation of dronebased civilian or military applications. The IoD based technological revolution upgrades the current Internet environment into a more pervasive and ubiquitous world. IoD is capable of enhancing the state-of-the-art for drones while leveraging services from the existing cellular networks. Irrespective to a vast domain and range of applications, IoD is vulnerable to malicious attacks over open-air radio space. Due to increasing threats and attacks, there has been a lot of attention on deploying security measures for IoD networks. In this paper, critical threats and vulnerabilities of IoD are presented. Moreover, taxonomy is created to classify attacks based on the threats and vulnerabilities associated with the networking of drone and their incorporation in the existing cellular setups. In addition, this article summarizes the challenges and research directions to be followed for the security of IoD.
The development of the Internet of Drones (IoD) becomes vital because of a
proliferation of dronebasedcivilian or military applications. The IoD based
technological revolution upgrades the currentInternet environment into a more pervasive
and ubiquitous world. IoD is capable of enhancing thestate-of-the-art for drones while
leveraging services from the existing cellular networks. Irrespectiveto a vast domain
and range of applications, IoD is vulnerable to malicious attacks over open-air
radiospace. Due to increasing threats and attacks, there has been a lot of attention on
deploying securitymeasures for IoD networks. In this paper, critical threats and
vulnerabilities of IoD are presented.Moreover, taxonomy is created to classify attacks
based on the threats and vulnerabilities associatedwith the networking of drone and
their incorporation in the existing cellular setups. In addition, thisarticle summarizes
the challenges and research directions to be followed for the security of IoD.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.