2016
DOI: 10.3390/s16111855
|View full text |Cite
|
Sign up to set email alerts
|

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

Abstract: Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Denial of Service (DoS): In this class of attacks, malicious users cripple the services offered by a site, for example by flooding a site with many requests [114]. In this way, they limit or deny the system services to legitimate users.…”
Section: ) Infrastructure Datasetsmentioning
confidence: 99%
“…Denial of Service (DoS): In this class of attacks, malicious users cripple the services offered by a site, for example by flooding a site with many requests [114]. In this way, they limit or deny the system services to legitimate users.…”
Section: ) Infrastructure Datasetsmentioning
confidence: 99%
“…Security on the protocol level is not involved. For example, the abuse of IoT communication protocols and the AR-DDoS [37] attack is performed by the IoT communication protocols Constrained Application Protocol (CoAP) [38], SSDP [39], and SNMP. Its target is not the flaws of IoT devices.…”
Section: Attack Surface On the Protocol Interface Layermentioning
confidence: 99%
“…In particular, authors focus on how to optimize the key thresholds for estimating the channel gain in Channel-Aware Encryption (CAE). In [ 24 ], authors methodically assess the possible impacts of a specific class of Amplified Reflection Distributed Denial of Service (AR-DDoS) attacks against IoT. In [ 25 ] authors propose a protocol designed for multi-hop communications between Device-to-Device (D2D)-enabled terminals equipped with light-weight security mechanisms.…”
Section: Related Workmentioning
confidence: 99%