A review of DDoS attacks and defenses in IoT.

The velocity at which the Internet of Things is becoming the norm is disturbing. People now could independently interact with our surroundings on a wide range of platforms from almost anywhere on the earth. Due to its nature, IoT security is only average. Other reasons like obsolete software, insuff...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd. Sam, Suriani, Mohamed, Norliza, Islam Wasi, Md. Wasif
Format: Article
Language:English
Published: Penerbit UTM Press 2022
Subjects:
Online Access:http://eprints.utm.my/104601/1/WasifIslamSurianiMohdSamHafizaAbas2022_AReviewofDDoSAttacksandDefenseinIoT.pdf
http://eprints.utm.my/104601/
https://oiji.utm.my/index.php/oiji/article/view/212
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.104601
record_format eprints
spelling my.utm.1046012024-02-21T08:25:17Z http://eprints.utm.my/104601/ A review of DDoS attacks and defenses in IoT. Mohd. Sam, Suriani Mohamed, Norliza Islam Wasi, Md. Wasif T Technology (General) T55-55.3 Industrial Safety. Industrial Accident Prevention The velocity at which the Internet of Things is becoming the norm is disturbing. People now could independently interact with our surroundings on a wide range of platforms from almost anywhere on the earth. Due to its nature, IoT security is only average. Other reasons like obsolete software, insufficient encryption, a lack of resources, and others all play a role in this. When you add this to how commonplace it is, it is an easy target for online thieves. An intentional attempt to stop a targeted server, service, or network's normal flow by saturating the target or its surrounding infrastructure with Internet traffic is known as a distributed denial-of-service (DDoS) assault. Defense against DDoS on the Internet of Things has become a pressing area of research as a result of recent incidents, including the alleged crash of several well-known servers in the years prior. This paper examines the numerous DDoS assault techniques used by attackers and offers security countermeasures. It also discusses obstacles and issues that must be resolved for a more effective response. Penerbit UTM Press 2022-12-15 Article PeerReviewed application/pdf en http://eprints.utm.my/104601/1/WasifIslamSurianiMohdSamHafizaAbas2022_AReviewofDDoSAttacksandDefenseinIoT.pdf Mohd. Sam, Suriani and Mohamed, Norliza and Islam Wasi, Md. Wasif (2022) A review of DDoS attacks and defenses in IoT. Open International Journal Of Informatics (OIJI), 10 (2). pp. 1-11. ISSN 2289-2370 https://oiji.utm.my/index.php/oiji/article/view/212
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T Technology (General)
T55-55.3 Industrial Safety. Industrial Accident Prevention
spellingShingle T Technology (General)
T55-55.3 Industrial Safety. Industrial Accident Prevention
Mohd. Sam, Suriani
Mohamed, Norliza
Islam Wasi, Md. Wasif
A review of DDoS attacks and defenses in IoT.
description The velocity at which the Internet of Things is becoming the norm is disturbing. People now could independently interact with our surroundings on a wide range of platforms from almost anywhere on the earth. Due to its nature, IoT security is only average. Other reasons like obsolete software, insufficient encryption, a lack of resources, and others all play a role in this. When you add this to how commonplace it is, it is an easy target for online thieves. An intentional attempt to stop a targeted server, service, or network's normal flow by saturating the target or its surrounding infrastructure with Internet traffic is known as a distributed denial-of-service (DDoS) assault. Defense against DDoS on the Internet of Things has become a pressing area of research as a result of recent incidents, including the alleged crash of several well-known servers in the years prior. This paper examines the numerous DDoS assault techniques used by attackers and offers security countermeasures. It also discusses obstacles and issues that must be resolved for a more effective response.
format Article
author Mohd. Sam, Suriani
Mohamed, Norliza
Islam Wasi, Md. Wasif
author_facet Mohd. Sam, Suriani
Mohamed, Norliza
Islam Wasi, Md. Wasif
author_sort Mohd. Sam, Suriani
title A review of DDoS attacks and defenses in IoT.
title_short A review of DDoS attacks and defenses in IoT.
title_full A review of DDoS attacks and defenses in IoT.
title_fullStr A review of DDoS attacks and defenses in IoT.
title_full_unstemmed A review of DDoS attacks and defenses in IoT.
title_sort review of ddos attacks and defenses in iot.
publisher Penerbit UTM Press
publishDate 2022
url http://eprints.utm.my/104601/1/WasifIslamSurianiMohdSamHafizaAbas2022_AReviewofDDoSAttacksandDefenseinIoT.pdf
http://eprints.utm.my/104601/
https://oiji.utm.my/index.php/oiji/article/view/212
_version_ 1792147861453930496
score 13.211869