Abstract

The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing.

Highlights

  • The Internet of Things (IoT) [1] is expected to cause more changes in the way technology permeates society and the economy

  • Attention should be drawn to the fact that: (i) the solutions are evaluated against Distributed Denial of Service (DDoS) attacks at low and high traffic rates; and (ii) machine learning approaches are more efficient in detecting malicious flows than conventional mitigation approaches that depend on dynamically-defined traffic limits

  • Among the solutions obtained from the use of the integrated Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to mitigate DDoS attacks are the schemes employed by Zhou and Guo [82]

Read more

Summary

A Taxonomy of DDoS Attack Mitigation Approaches

Felipe S. Dantas Silva 1,2, * , Esau Silva 1 , Emidio P. Neto 1,2 , Marcilio Lemos 1,2 , Augusto J. Venancio Neto 2,3 and Flavio Esposito 4 LaTARC Research Lab (IFRN), Federal Institute of Education, Science and Technology of Rio Grande do Department of Informatics and Applied Mathematics (DIMAp), Federal University of Rio Grande do

Introduction
Problem Statement
Contributions
Paper Organization
Theoretical Background
IoT Security
Distributed Denial of Service Attacks
Application Layer Attacks
Resource Exhaustion Attacks
Volumetric Attacks
Mitigation Strategies for DDoS Attacks by Means of SDN
Flow Filtering
Honeypots
Rate Limiting
Moving Target Defense
Traceback
Request Prioritization
Related Work
Review Research Method
Selecting Digital Libraries
Search Term Used for the Filter
Filtering Based on Titles and Abstracts
Selection Based on Full Reading
Comprehensive Review of Selected Publications
Cosine Similarity
Moving Target Defense—MTD
Collaboration between Multiple Mitigation Strategies
Classification of Reviewed Studies
Comparison of Analyzed Solutions
IoT Application Scenarios
Generic
SDN Control Plane
Smart Homes
Other Scenarios
Open Research Challenges
Flexibility to Meet Different Security Requirements
Mitigation of DDoS Attacks Based on IoT Protocols
Network Function Virtualization
Fog Computing
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call