Abstract

Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high diversity in both hardware and software. Existing security models, approaches and solutions are not able to sufficiently protect such systems. In this paper we propose the use of lightweight agents installed at multiple internet of things (IoT) installations (e.g., smart-homes), in order to collaboratively detect distributed denial of service (DDoS) attacks conducted by the use of IoT devices botnets. Specifically, agents exchange outbound traffic information in order to identify possible victims of DDoS attacks. This information exchange is governed by a blockchain smart contract, that ensures the integrity of both the procedure and the information. A simulation of the operation of the proposed methodology has been conducted in order to evaluate both its detection efficiency and its resilience against malicious agents that aim to falsify results.

Highlights

  • Internet of Things is one of the most evident advancements in computing through the last decade

  • Security of internet of things (IoT) devices is a major issue, as such devices usually become the means for conducting attacks against other hosts

  • One such case is the execution of distributed denial of service (DDoS) attacks, through the use of IoT devices in constructing botnets

Read more

Summary

Introduction

Internet of Things is one of the most evident advancements in computing through the last decade. It has enabled the embedding of computing power and network communication capabilities into a variety of devices, which can provide new kinds of services to users Multiple domains such as health-care, industry, physical security, farming and even home automation have been revolutionized due to the use of internet of things (IoT) devices [1,2]. An agent based approach to detect DDoS attacks that are executed through the use of multiple infected IoT devices is presented. In such attacks, infected devices form a botnet that sends a high load of traffic to a victim host, in order to set the latter unable to respond to normal requests.

DDoS in IoT Environments
Blockchain and DDoS Detection
Our Approach
The Model
Agents
Implementation
Modeling Normal Traffic
Modelling DDoS Attack Traffic
Monitoring Model
Information Gathering
Evaluation
Consensus
Consensus Mechanism
The Fault-Tolerant Path-Message
Smart Contract
Security Analysis
Blockchain Limitations
Detection Capability
Robustness Against Malicious Nodes
Conclusion and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call