2020 IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET) 2020
DOI: 10.1109/honet50430.2020.9322808
|View full text |Cite
|
Sign up to set email alerts
|

Securing ZigBee IoT Network Against HULK Distributed Denial of Service Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…This methodology can be utilized in smart agriculture applications and encompasses four ML algorithms, i.e., RF, KNN, Naive Bayes and SVMs. The experimental results showed the high effectiveness of the proposed methodology in distinguishing normal traffic from attack traffic [22].…”
Section: Related Workmentioning
confidence: 90%
See 1 more Smart Citation
“…This methodology can be utilized in smart agriculture applications and encompasses four ML algorithms, i.e., RF, KNN, Naive Bayes and SVMs. The experimental results showed the high effectiveness of the proposed methodology in distinguishing normal traffic from attack traffic [22].…”
Section: Related Workmentioning
confidence: 90%
“…Their experimental results showed that their approach can provide promising results for network flow classification. Towards the same direction, Asonye et al [22] proposed a network traffic classification methodology aiming to secure ZigBee IoT networks against the HTTP Unbearable Load King (HULK) threat. This methodology can be utilized in smart agriculture applications and encompasses four ML algorithms, i.e., RF, KNN, Naive Bayes and SVMs.…”
Section: Related Workmentioning
confidence: 99%
“…It takes its name from a satellite weapon used to similarly damage electronics in the James Bond movie of the same name. A GoldenEye attack involves the attacker saturating the target network or system with a lot of traffic, which makes it unable to respond to incoming requests [36,37]. This kind of attack can be very successful if the attacker combines several attack channels to send as much traffic as possible, such as HTTP, TCP, and UDP flooding.…”
Section: Accuracymentioning
confidence: 99%
“…Due to this attack, the attacker can access databases, application layers, and private data. 55 Asonye et al 56 proposed the security solution against the HULK DDoS attack. The attack, which is very difficult to identify and harmful, was detected with the help of the ZigBee network.…”
Section: Application Layermentioning
confidence: 99%
“…Due to this attack, the attacker can access databases, application layers, and private data 55 . Asonye et al 56 proposed the security solution against the HULK DDoS attack. The attack, which is very difficult to identify and harmful, was detected with the help of the ZigBee network. Trojan horse : This is one of the most common attacks in which if the user downloads some malicious file, then this virus automatically gets installed inside the user PC.…”
Section: Taxonomy Of Iot Security Attacksmentioning
confidence: 99%