A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks

Today, many smart devices support IPv6 communication. IPv6 provides a larger address space capable to address up to 3.4x1038 devices. This is the reason why IoT devices have started addressing and networking in IPv6. However, a large number of IoT devices can be misused by hackers. A preferred method of attackers in recent years is the DDoS attack carried from IoT devices.

[1]  Halenar Igor,et al.  Proposal of communication standardization of industrial networks in Industry 4.0 , 2016, 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES).

[2]  Vladimir Siladi,et al.  Phobia treatment with the help of virtual reality , 2015, 2015 IEEE 13th International Scientific Conference on Informatics.

[3]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.

[4]  Ladislav Huraj,et al.  IPv6 Network DDoS Attack with P2P Grid , 2015 .

[5]  Brian Cusack,et al.  Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT , 2016, InterIoT/SaSeIoT.

[6]  M. Cernanský,et al.  Performance Evaluations of IPTables Firewall Solutions under DDoS attacks , 2015 .

[7]  Paulo S. Motta Pires,et al.  Using a packet manipulation tool for security analysis of industrial network protocols , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[8]  Ali Saman Tosun,et al.  Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[9]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[10]  Marek Simon,et al.  IoT Measuring of UDP-Based Distributed Reflective DoS Attack , 2018, 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY).

[11]  Darja Gabriska,et al.  Motion Capture as an Extension of Web-Based Simulation , 2014 .

[12]  Manasi Gyanchandani,et al.  Analysis of Botnet Behavior Using Queuing Theory , 2010 .

[13]  Steve Mansfield-Devine,et al.  The growth and evolution of DDoS , 2015, Netw. Secur..

[14]  Elisa Bertino,et al.  Heimdall: Mitigating the Internet of Insecure Things , 2017, IEEE Internet of Things Journal.

[15]  Davar Pishva IoT: Their Conveniences, Security Challenges and Possible Solutions , 2017 .

[16]  Iveta Dirgová Luptáková,et al.  Community Cut-off Attack on Malicious Networks , 2017 .

[17]  D. Bastos,et al.  Internet of Things: A survey of technologies and security risks in smart home and city environments , 2018, IoT 2018.