Abstract
In the rapidly evolving landscape of vehicular networks, the resilience of vehicular communication systems against Denial of Service (DoS) attacks is critical. Existing research often overlooks the nuanced dynamics of such attacks, particularly in terms of packet size variability and vehicle mobility within Software-Define Internet of Vehicles (SD-IoV) systems. This study addresses this research gap by conducting a detailed analysis of SYN flood DoS attack patterns and their impact on SDN-controlled vehicular networks. This research examines the effects of different packet sizes in SYN packet—1 byte, 200 bytes, 360 bytes, and 1400 bytes—and explore how these packet size variations influence the efficacy of the attacks and the resultant downtime experienced by the victim car. This research findings reveal that SYN flood attacks employing minimal 1-byte packets can cause prolonged unresponsiveness in the victim vehicle, leading to a drastic drop in packet throughput. This research underscores the subtleties of DoS attack strategies and their significant implications on the functionality and safety of IoV environments. The alarming potential of such refined and coordinated DoS attack highlights an urgent need for the development of robust defense mechanisms that can adapt to the sophisticated landscape of vehicular cyber threats.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.