2018
DOI: 10.1007/978-3-319-91192-2_5
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Reflection Attack Based on IoT: A Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Distributed Reflection Denial of Service Attack (DRDoS): DRDoS is one form of DDoS attack. In this attack, an attacker preserves anonymity through an IP address by using a third party, called a reflector, which needs not be compromised [ 176 ]. Numerous victim machines that unintentionally take part in a DDoS attack on the attacker’s target are typically used in DRDoS attacks.…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%
“…Distributed Reflection Denial of Service Attack (DRDoS): DRDoS is one form of DDoS attack. In this attack, an attacker preserves anonymity through an IP address by using a third party, called a reflector, which needs not be compromised [ 176 ]. Numerous victim machines that unintentionally take part in a DDoS attack on the attacker’s target are typically used in DRDoS attacks.…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%
“…Despite the fact that IoT offers several benefits in healthcare settings, one of the major challenges limiting its application are security threats, such as data theft, device hijacking, system attacks (e.g., Distributed Denial of Service or DDoS), data ownership disputes, etc. The interconnection between IoT-based devices with the internet makes them prone to cyber-attacks or hacks [ 82 , 83 ]. Moreover, the use of IoT-based devices requires the use of data storage, such as the cloud, as well as the transfer of a patient’s data through the internet, which raises issues regarding privacy and security [ 84 ].…”
Section: Computer-aided Diagnosis (Cad) and Internet Of Medical Thing...mentioning
confidence: 99%
“…To increase security levels, these companies developed an authentication approach which gives access to only a few staff members with clearance. Other practices that can increase security include implementing security protocols through tracking and monitoring, network segmentation, monitoring of inventories of devices, and encryption [ 82 , 83 , 84 ].…”
Section: Computer-aided Diagnosis (Cad) and Internet Of Medical Thing...mentioning
confidence: 99%
“…The centralized scanning mechanism of JenX enables attackers to offer botnet-for-hire and DDoSfor-hire services [21]. Other attacks were explored by [18] and [22], who inquired into potential attacks by employing IoT as a reflector of DDoS attacks, which are very difficult to trace. Adding to our understanding of cyberattacks, Soltan et al [23] examined a possible attack in which a botnet utilizes highwattage IoT devices to manipulate demand and thus disrupt power grid operations.…”
Section: A Iot Botnetsmentioning
confidence: 99%