| Literature DB >> 32028711 |
Jesús Galeano-Brajones1, Javier Carmona-Murillo1, Juan F Valenzuela-Valdés2, Francisco Luna-Valero3,4.
Abstract
The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic.Entities:
Keywords: DDoS; DoS; Internet of Things; entropy; experimental evaluation; stateful SDN
Year: 2020 PMID: 32028711 PMCID: PMC7038683 DOI: 10.3390/s20030816
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Software Defined Network (SDN) architecture.
Summary of SDN security threats.
| Attack Type | Security Property | SDN NE | SDN Controller | SDN Application |
|---|---|---|---|---|
| Spoofing | Authentication | vulnerable | vulnerable | vulnerable |
| Tampering | Integrity | vulnerable | vulnerable | vulnerable |
| Repudiation | Non-repudiation | - | vulnerable | - |
| Information disclosure | Confidentiality | vulnerable | vulnerable | vulnerable |
| Denial of service (DoS) | Availability | vulnerable | vulnerable | vulnerable |
| Distributed DoS (DDoS) | Availability | vulnerable | vulnerable | vulnerable |
| Elevation of privileges | Authorization | vulnerable | vulnerable | - |
Certainty that a threat is occurring based on the accuracy of the distribution.
|
| Certainty |
|---|---|
| 1 | 68% |
| 2 | 95% |
| 3 | 99.7% |
Figure 2Algorithm flowchart.
Figure 3Testbed topology of the first scenario.
Figure 4Entropy values during the Denial of Service (DoS) attack.
Figure 5Throughput values during the DoS attack.
Figure 6Test bed topology of the second scenario. Adapted from [16].
Figure 7Entropy variation for a DoS flooding with spoofed src port attack in Internet of Things (IoT).
Figure 8Entropy variation for a Distributed Denial of Service (DDoS) TCP SYN flood attack.
Figure 9Pipeline for new flows in the state tables.
Figure 10Test bed topology of the third scenario. Adapted from [16].
Results of experimentation with IoT traffic for different window and values.
| window - | Detection Rate | False Positive Rate | Mean (ms) | Standard Deviation (ms) |
|---|---|---|---|---|
|
| 100% | 90% | 16.32 | 2.17 |
|
| 100% | 20% | 20.20 | 6.38 |
|
| 90% | 20% * | 19.06 | 9.27 |
|
| 100% | 70% | 19.09 | 8.30 |
|
| 100% | 70% | 20.96 | 7.04 |
|
| 100% | 20% * | 19.30 | 3.66 |
|
| 100% | 60% | 22.82 | 10.38 |
|
| 100% | 60% | 21.41 | 7.25 |
|
| 100% | 20% * | 21.27 | 8.56 |
|
| 100% | 80% | 26.93 | 13.45 |
|
| 100% | 40% | 24.03 | 14.14 |
|
| 80% | 20% * | 26.98 | 10.89 |
Figure 11Entropy variation for a DDoS flooding attack in IoT scenario with 15 attackers.
Figure 12Throughput values during a DDoS attack.