2019
DOI: 10.1515/nleng-2017-0094
|View full text |Cite
|
Sign up to set email alerts
|

Mathematical model on distributed denial of service attack through Internet of things in a network

Abstract: Internet of Things (IoT) opens up the possibility of agglomerations of different types of devices, Internet and human elements to provide extreme interconnectivity among them towards achieving a completely connected world of things. The mainstream adaptation of IoT technology and its widespread use has also opened up a whole new platform for cyber perpetrators mostly used for distributed denial of service (DDoS) attacks. In this paper, under the influence of internal and external nodes, a two - fold epidemic m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Hou et al [10] investigated a DDoS attack model with a saturated contact infection rate and proved the stability of this model. Mishra et al [11] considered the characteristics of DDoS attacks on the Internet of ings (IoT) and proposed a DDoS attack model on IoT, given the conditions for a successful attack. Furthermore, some effective defense strategies, such as installing defense software and upgrading firewalls, have been widely used to mitigate DDoS attacks [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…Hou et al [10] investigated a DDoS attack model with a saturated contact infection rate and proved the stability of this model. Mishra et al [11] considered the characteristics of DDoS attacks on the Internet of ings (IoT) and proposed a DDoS attack model on IoT, given the conditions for a successful attack. Furthermore, some effective defense strategies, such as installing defense software and upgrading firewalls, have been widely used to mitigate DDoS attacks [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…Based on the mean-field theory, Zhang et al [14], [15] developed APDDoS attack models against scale-free networks and arbitrary networks, respectively. Mishra et al [16] proposed an APDDoS model in an Internet of Things (IoT) environment where they analyzed the conditions in which successful attacks can be launched.…”
Section: Introductionmentioning
confidence: 99%