2021
DOI: 10.3390/electronics10111282
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach

Abstract: The Internet of Things (IoT) has gained remarkable acceptance from millions of individuals. This is evident in the extensive use of intelligent devices such as smartphones, smart television, speakers, air conditioning, lighting, and high-speed networks. The general application area of IoT includes industries, hospitals, schools, homes, sports, oil and gas, automobile, and entertainment, to mention a few. However, because of the unbounded connection of IoT devices and the lack of a specific method for overseein… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Tufail et al (2021) gather attacker information by introducing honeypots in Advance Metering Infrastructure (AMI) of the smart grid network and analyzes the interaction between attacker and defender using Bayesian-Nash equilibrium to apply defense strategy accordingly. Ghali et al (2021) prevent and mitigate DDoS attack impacts by reducing data computational burden of AMI using a firewall integrated with the cloud computing-based processing method. Srikantha and Kundur (2015) proposed a collaborative reputation topology configuration based on the autohealing method for the stability of the overall power network, while one node of the network is under attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Tufail et al (2021) gather attacker information by introducing honeypots in Advance Metering Infrastructure (AMI) of the smart grid network and analyzes the interaction between attacker and defender using Bayesian-Nash equilibrium to apply defense strategy accordingly. Ghali et al (2021) prevent and mitigate DDoS attack impacts by reducing data computational burden of AMI using a firewall integrated with the cloud computing-based processing method. Srikantha and Kundur (2015) proposed a collaborative reputation topology configuration based on the autohealing method for the stability of the overall power network, while one node of the network is under attack.…”
Section: Literature Reviewmentioning
confidence: 99%