2009
DOI: 10.1007/978-3-642-04492-2_66
|View full text |Cite
|
Sign up to set email alerts
|

Attack Model and Detection Scheme for Botnet on 6LoWPAN

Abstract: Abstract. Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have been proposed to detect Botnet on wired network. However, in IP based sensor network environment, there is no detection mechanism for Botnet attacks. In this paper, we analyze the threat of Botnet on 6LoWPAN and propose a mechanism to detect Botnet on 6LoWPAN.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 1 publication
(1 reference statement)
0
18
0
1
Order By: Relevance
“…Cho et al proposed a methodology for checking packets that are passing through the border router for communication between physical and the network devices. Their methodology was based on the botnet attacks by checking the packet length [29]. However, no information is presented about the technique can be employed to create normal behavior profiles.…”
Section: Related Workmentioning
confidence: 99%
“…Cho et al proposed a methodology for checking packets that are passing through the border router for communication between physical and the network devices. Their methodology was based on the botnet attacks by checking the packet length [29]. However, no information is presented about the technique can be employed to create normal behavior profiles.…”
Section: Related Workmentioning
confidence: 99%
“…The most common attack in the category of threats arising from the Internet is the botnet attack where data is forged by the botnet network and the wrong data is sent to the user node. In [46], authors proposed an additional module in 6LoWPAN gateway that analyses data passing though the gateway searching for malicious traffic. The security treats to the 6LoWPAN arising from the RPL routing protocol will be discussed next.…”
Section: Attacks and Security Mechanisms For Adaptation And Network mentioning
confidence: 99%
“…Authentication attack Network access control framework [44] PS Provides the node identification, but only enables one border router; Not implemented yet; Man in the middle, Eavesdropping/spoofing IPsec (AH and EPS) [45] PS Provides end-to-end secure communication; Pre-shared keys mechanism is not very flexible; Botnet attack Bot analysis module [46] IDS Good detection rates for large number of nodes; Decreased network performance and large overhead; RPL Selective forwarding attack Lightweight Heartbeat [48] IDS It has to be combined with IPsec to detect attack; No defense is provided after the attack is detected; Resilient techniques [51] PS Improved delivery ratio, but an increase in energy consumption; Spoofed/altered inf., sinkhole, selective forwarding SVELTE [50] IDS SVELTEs overhead is small enough; The true positive rate is not 100% due to some false alarms; Sinkhole attack IDS solution [52] IDS IPsec and bidirectional communication are necessary. Parent fail-over & rank authentication [53] …”
Section: Psmentioning
confidence: 99%
“…Cho et al [15] proposed a botnet detection mechanism for 6LoWPAN-based networks in 2009. They assumed that the nodes in the IoT network use TCP transport layer protocol.…”
Section: Intrusion Detection Systems Proposed For Internet Of Thingsmentioning
confidence: 99%