2020
DOI: 10.1109/access.2020.2977112
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Cost Distributed Denial-of-Service Attack Architecture

Abstract: With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely low cost. First, a new DDoS attack architecture is proposed. Since the proposed architecture enjoys the advantages of zero management cost, good undetectability, and strong robustness, it is especially suited to resource-limited DDoS attackers. In this architect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 34 publications
(26 reference statements)
0
7
0
Order By: Relevance
“…Assault detection is made easier by adjusting the parameters of DNN and AE in a way designed for this goal. To avoid overfitting, the author of this article explains how to reduce reconstruction error, remove gradient inflating or disappearing, and develop a more compact network with fewer nodes [37]. Performance criteria such as detection accuracy, precision, recall, and F1-Score were used to compare the proposed approach to ten current best practices.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Assault detection is made easier by adjusting the parameters of DNN and AE in a way designed for this goal. To avoid overfitting, the author of this article explains how to reduce reconstruction error, remove gradient inflating or disappearing, and develop a more compact network with fewer nodes [37]. Performance criteria such as detection accuracy, precision, recall, and F1-Score were used to compare the proposed approach to ten current best practices.…”
Section: Related Workmentioning
confidence: 99%
“…New defenses against DDoS attacks are now possible due to the growth of Software Defined Networking technology. Two methodologies have been developed in [37] to identify DDoS attacks. One technique is to identify the source of a DDoS assault to measure the intensity of the attack.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Zhang et al [16] constructed an optimal control model for DDoS attacks on the Internet of ings and obtained its optimal defense strategy. Huang et al [17] proposed a new low-cost DDoS attack architecture and got three optimal attack strategies based on variational method. Li et al [18] established a low-rate DDoS attack model based on cloud computing environment and proposed a strategy to mitigate low-rate DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%