2020
DOI: 10.1007/978-3-030-51971-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…• Denial of Service (DoS) attack: The adversary floods the nodes with spurious requests to slowdown or shutdown an IoT ecosystem, thus, preventing users from accessing it [32]. The packets are fake as they are spoofed and are full of random values [33].…”
Section: Hardware-related Attacksmentioning
confidence: 99%
“…• Denial of Service (DoS) attack: The adversary floods the nodes with spurious requests to slowdown or shutdown an IoT ecosystem, thus, preventing users from accessing it [32]. The packets are fake as they are spoofed and are full of random values [33].…”
Section: Hardware-related Attacksmentioning
confidence: 99%
“…• Man-in-The-Middle (MiTM) attack: The adversary intercepts and alters the genuine communication between the sender and the receiver without their knowledge, thus, manipulating both ends of information in real time. an IoT ecosystem, thus, preventing users from accessing it [46]. DoS attacks employ techniques like flooding the target with UDP or ICMP packets to target various network devices, such as routers, switches, and firewalls.…”
Section: B Network Attacksmentioning
confidence: 99%
“…For example, in 2012, a botnet-based DDoS attack flooded a group of US banks with up to 75 Gbps of malicious traffic [10], while in 2013, a nonprofit organization named Spamhaus suffered a massive DDoS attack involving 300 Gbps of traffic [11]. In 2014, an unnamed Internet service provider was attacked by a network time protocol that generated traffic of up to 400 Gbps, which led to it becoming inaccessible to clients [12]. In October 2016, the Mirai botnet attacked Dyn, a web application security company, with up to 1.2 Tbps of malicious traffic [13].…”
Section: Background and Motivationmentioning
confidence: 99%