2020
DOI: 10.1007/s40031-020-00442-z
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…In a WSN, devices at the edge are possible breakdown points where attacks like Distributed Denial-of-Service (DDoS) could be established [122], [123]. At the WSN edge, infected nodes could collaborate to crash the WSN service provision, as observed in the botnet attack in August 2016 [124]. In the latest attack, the Mirai botnet developed and raised the most potent attack in opposition to WSN security by compromising the WSN nodes and creating malicious traffic in the order of Tbps [124].…”
Section: Security Problems Of Centralized Wsn Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…In a WSN, devices at the edge are possible breakdown points where attacks like Distributed Denial-of-Service (DDoS) could be established [122], [123]. At the WSN edge, infected nodes could collaborate to crash the WSN service provision, as observed in the botnet attack in August 2016 [124]. In the latest attack, the Mirai botnet developed and raised the most potent attack in opposition to WSN security by compromising the WSN nodes and creating malicious traffic in the order of Tbps [124].…”
Section: Security Problems Of Centralized Wsn Modelsmentioning
confidence: 99%
“…At the WSN edge, infected nodes could collaborate to crash the WSN service provision, as observed in the botnet attack in August 2016 [124]. In the latest attack, the Mirai botnet developed and raised the most potent attack in opposition to WSN security by compromising the WSN nodes and creating malicious traffic in the order of Tbps [124]. Subsequently, after the Mirai botnet source code was openly released, an abundance of attacks followed, the most notable is October 2016 attack, which brought down numerous standard websites for many hours.…”
Section: Security Problems Of Centralized Wsn Modelsmentioning
confidence: 99%
“…The router strategy is extended by [14]. The paper demonstrates how to use a software-defined network architecture for edge DDoS protection, possibly leveraging infrastructure that is already in place.…”
Section: Related Workmentioning
confidence: 99%
“…Wani et. al [45] proposes SD-IoT-based security mechanism for DDoS detection in SD-IoT network. This research uses MCOD and MLP approaches to identify the abnormal behavior of IoT networks.…”
Section: ) Data Planementioning
confidence: 99%