A review of DDoS attacks and defenses in IoT.
The velocity at which the Internet of Things is becoming the norm is disturbing. People now could independently interact with our surroundings on a wide range of platforms from almost anywhere on the earth. Due to its nature, IoT security is only average. Other reasons like obsolete software, insuff...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press
2022
|
Subjects: | |
Online Access: | http://eprints.utm.my/104601/1/WasifIslamSurianiMohdSamHafizaAbas2022_AReviewofDDoSAttacksandDefenseinIoT.pdf http://eprints.utm.my/104601/ https://oiji.utm.my/index.php/oiji/article/view/212 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.104601 |
---|---|
record_format |
eprints |
spelling |
my.utm.1046012024-02-21T08:25:17Z http://eprints.utm.my/104601/ A review of DDoS attacks and defenses in IoT. Mohd. Sam, Suriani Mohamed, Norliza Islam Wasi, Md. Wasif T Technology (General) T55-55.3 Industrial Safety. Industrial Accident Prevention The velocity at which the Internet of Things is becoming the norm is disturbing. People now could independently interact with our surroundings on a wide range of platforms from almost anywhere on the earth. Due to its nature, IoT security is only average. Other reasons like obsolete software, insufficient encryption, a lack of resources, and others all play a role in this. When you add this to how commonplace it is, it is an easy target for online thieves. An intentional attempt to stop a targeted server, service, or network's normal flow by saturating the target or its surrounding infrastructure with Internet traffic is known as a distributed denial-of-service (DDoS) assault. Defense against DDoS on the Internet of Things has become a pressing area of research as a result of recent incidents, including the alleged crash of several well-known servers in the years prior. This paper examines the numerous DDoS assault techniques used by attackers and offers security countermeasures. It also discusses obstacles and issues that must be resolved for a more effective response. Penerbit UTM Press 2022-12-15 Article PeerReviewed application/pdf en http://eprints.utm.my/104601/1/WasifIslamSurianiMohdSamHafizaAbas2022_AReviewofDDoSAttacksandDefenseinIoT.pdf Mohd. Sam, Suriani and Mohamed, Norliza and Islam Wasi, Md. Wasif (2022) A review of DDoS attacks and defenses in IoT. Open International Journal Of Informatics (OIJI), 10 (2). pp. 1-11. ISSN 2289-2370 https://oiji.utm.my/index.php/oiji/article/view/212 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
T Technology (General) T55-55.3 Industrial Safety. Industrial Accident Prevention |
spellingShingle |
T Technology (General) T55-55.3 Industrial Safety. Industrial Accident Prevention Mohd. Sam, Suriani Mohamed, Norliza Islam Wasi, Md. Wasif A review of DDoS attacks and defenses in IoT. |
description |
The velocity at which the Internet of Things is becoming the norm is disturbing. People now could independently interact with our surroundings on a wide range of platforms from almost anywhere on the earth. Due to its nature, IoT security is only average. Other reasons like obsolete software, insufficient encryption, a lack of resources, and others all play a role in this. When you add this to how commonplace it is, it is an easy target for online thieves. An intentional attempt to stop a targeted server, service, or network's normal flow by saturating the target or its surrounding infrastructure with Internet traffic is known as a distributed denial-of-service (DDoS) assault. Defense against DDoS on the Internet of Things has become a pressing area of research as a result of recent incidents, including the alleged crash of several well-known servers in the years prior. This paper examines the numerous DDoS assault techniques used by attackers and offers security countermeasures. It also discusses obstacles and issues that must be resolved for a more effective response. |
format |
Article |
author |
Mohd. Sam, Suriani Mohamed, Norliza Islam Wasi, Md. Wasif |
author_facet |
Mohd. Sam, Suriani Mohamed, Norliza Islam Wasi, Md. Wasif |
author_sort |
Mohd. Sam, Suriani |
title |
A review of DDoS attacks and defenses in IoT. |
title_short |
A review of DDoS attacks and defenses in IoT. |
title_full |
A review of DDoS attacks and defenses in IoT. |
title_fullStr |
A review of DDoS attacks and defenses in IoT. |
title_full_unstemmed |
A review of DDoS attacks and defenses in IoT. |
title_sort |
review of ddos attacks and defenses in iot. |
publisher |
Penerbit UTM Press |
publishDate |
2022 |
url |
http://eprints.utm.my/104601/1/WasifIslamSurianiMohdSamHafizaAbas2022_AReviewofDDoSAttacksandDefenseinIoT.pdf http://eprints.utm.my/104601/ https://oiji.utm.my/index.php/oiji/article/view/212 |
_version_ |
1792147861453930496 |
score |
13.211869 |