This is the instructions for this assignment:Attached please find thepaper for yourcoursetermproject. This is the baseline paper. You need to read more papers regarding this subject (from references...

1 answer below »
This is the instructions for this assignment:Attached please find thepaper for yourcoursetermproject. This is the baseline paper.
You need to read more papers regarding this subject (from references and internet).
Then you write yourtermprojectby focusing on:

(1) What are the issues? (2) What are the techniques/approaches used until now to attack the problems identifiedin part (1)? (3) Your critics of the current approaches (or shortcomings of the current solutions). (4) Summaryand conclusions. You also can include possible future work in this area.NOTE:I do not want a summary of the baseline paper.Here I submit the file with the title of the project.Please put all the references that you used.Thanks
Answered 3 days AfterApr 05, 2022

Solution

Dr Raghunandan G answered on Apr 08 2022
12 Votes
DDoS Attack Detection for IoT Environment
Abstract:
In today’s world of fast networks and changing times, the Internet of Things (IoT) has attracted a lot of attention. The IoT’s ability to connect various devices and make data transfers faster than ever before has led to its boom in recent days. On the other side of things, the IoT has also become a
eeding ground for cyber-attacks. With the advancement of Internet of Things (IoT) technologies, network security issues have become increasingly prominent. On the network, there have been numerous malicious attacks. Because of their highly spread and connected nature, maintaining the stability and reliability of IoT devices is a difficult challenge. The most prevalent approach to disable a network's accessibility is through distributed denial-of-service (DDoS) assaults. DDoS assaults have a minimal launch cost and a high attack intensity, allowing them to swiftly cause significant damage to their targets. DDoS attacks differ from penetration attacks in that they do not use a Trojan or root application to infiltrate the target systems. Many researchers in the field of network security have been drawn to it. The most common kind of attack is the DDoS attack which takes advantage of the huge network of devices under IoT.
Introduction:
The DDoS attack or the Distributed Denial of Service attack is a virtual attack in which the server is attacked by several other devices by overloading data and making it incapable of receiving anymore data. The devices that help and participate in such attacks can be smartphones, cameras, computers and several other personal devices. All of these devices must be connected to the internet to ca
y out these attacks. The severity of the attacks can be increased by the use of Internet of Things (IoT). The perpetrators use home devices like the Wi-Fi routers, Smart TVs, CCTV cameras etc., to send a flood of traffic to selected servers to disable them. As the IoT devices have very little or no security, taking advantage of the number of IoT devices available, the attacker uses these devices as botnets. Most of the people are unaware of the fact that their devices are being used as botnets and hence become victims to identity thefts, even physical harm.According to a 2018 DDoS report, there are seven major DDoS protection challenges. They include the types of attacks that have become complex and diverse in nature, need of
oader protection against the attacks of DDoS, Attacks happening from various places at a time, Requirement of major manual intervention, Cost prohibited usage, Inability to combine various capabilities and Lack of granular control for agile responses. The year 2020 was called the year of DDoS attack. DDoS attacks increased to the peak year 2020. This year was driven by the pandemic and led many people to work from home, and use online services to get through the pandemic situation.
According to a report given by NETSCOUT, more than 10 million DDoS attacks were launched during the pandemic year, this was mainly targeting many of the remote and essential services people were using to make it through the lockdown. Healthcare, remote learning, e-commerce, and streaming services were suffered by DDoS attacks, this inte
upted business operations.The fig 1 shows the DDoS attack over time.
DDoS attacks would dramatically expand when 5G was introduced. According to A10, 127 new IoT devices are connected per second prior to the introduction of 5G. As a result of increasing bandwidth and lower latency, the addition of a significant number of IoT devices to the global network will be the primary engine of growth. Lower latency indicates the effective response time to attacks of DDoS which will be seconds rather than minutes,along with increasing the number of susceptible devices. These characteristics, however, will give automated security responses based on AIML systems a major boost, according to the report.
Fig 1.DDoS Attack Over Time
Literature review:
There are a few technical precautions that can be used to assist limit the impact of an attack, particularly in the initial minutes, and few of them are quite basic. Filters should be applied to your router to instruct it to reject packets from known sources of attack, timeout half-open connections, and rate limit your router to keep your Web server from becoming overwhelmed. Lower UDP, ICMP, and SYN, flood drop thresholds should be modified to aggressively drop spoofed or malformed packages. However, while these safeguards were once effective, DDoS attacks have grown in size to the point where they can no longer be totally stopped by these measures. To confront the most common challenges in DDoS protection, Here are the things companies are searching for in a solution for the DDoS attack.
According to the report, [7] it was found that the most wanted capability was automated detection and mitigation (25 percent), Expansive policies for objects that are protected (16 percent), Hardware-accelerated traffic processing and programmability (15 percent) and the last three places are occupied by custom processors (10 percent), threat intelligence (13 percent), and reporting (7 percent) Fig 2 shows the most desired capability in DDOS solution.
Fig 2: Most desired capability in DDoS solution
The approach in [1] explores the use of honeypot-based detection framework with machine learning. The honeypot is used to attract the perpetrators with the intention to capture the virus properties and its invasion method and records this information in its log files. A detection framework based on machine learning is used to predict any suspicious activity with the help of the log files generated. The log files collect information that gives us an idea of new virus and malware types, variants and what type of devices they target. The suggested solution's architecture is as follows: An attacker attempts to inject malware over an open port by logging into an IoT device using multiple ID and password combinations. In this...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here