| Literature DB >> 32485943 |
Felipe S Dantas Silva1,2, Esau Silva1, Emidio P Neto1,2, Marcilio Lemos1,2, Augusto J Venancio Neto2,3, Flavio Esposito4.
Abstract
The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing.Entities:
Keywords: Distributed Denial of Service Attacks (DDoS); Internet of Things (IoT); Software-Defined Networking (SDN); revision; state-of-the-art; taxonomy
Year: 2020 PMID: 32485943 PMCID: PMC7309081 DOI: 10.3390/s20113078
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Classification of Internet of Things (IoT) applications based on your security requirements [31].
| IoT Applications | Impact of DDoS Attacks | Security Requirements |
|---|---|---|
| Traffic Engineering | High | Services can not be interrupted in any way. |
| Electrical network control | ||
| Healthcare | ||
| Location systems | Moderate | Reactive mitigation solutions are the most suitable choice. |
| Agriculture | ||
| Industrial Management | ||
| Home automation | Low | Reactive approaches are the most appropriate. |
| Water supply | ||
| Weather monitoring | ||
| Parking control |
Analysis of contributions provided by our proposal concerning featured parameters with respect to plain related proposals.
| Publication | Year | #1 | #2 | #3 | #4 |
|---|---|---|---|---|---|
| Kouicem et al. [ | 2018 | 2 | |||
| Kalkan and Zeadally [ | 2018 | 1 | |||
| Lohachab and Karambir [ | 2018 | 1 | |||
| Salman et al. [ | 2018 | 2 | |||
| Kanagavelu and Aung [ | 2019 | 2 | |||
| Cherian and Chatterjee [ | 2019 | 4 | ✓ | ||
| Vishwakarma and Jain [ | 2019 | 1 | ✓ | ||
| Salim et al. [ | 2019 | 4 | ✓ | ✓ | |
| This work | 2020 | 25 | ✓ | ✓ | ✓ |
Figure 1Flowchart for the selection of papers.
Figure 2Proposed taxonomy.
Comparison of mitigation solutions using Software-Defined Networking (SDN) in IoT environments.
| Solution Approach | Mitigation Strategy | Proposal | #1 | #2 | #3 | #4 |
|---|---|---|---|---|---|---|
| Pure SDN | Flow filtering | Bull et al. [ | ✓ | ✓ | ||
| Xu et al. [ | ✓ | |||||
| Salva-Garcia et al. [ | ✓ | |||||
| Rafique et al. [ | ✓ | |||||
| Bawany and Shamsi [ | ||||||
| Yang et al. [ | ✓ | |||||
| Rafique et al. [ | ✓ | |||||
| Nair et al. [ | ||||||
| Galeano-Brajones et al. [ | ✓ | |||||
| Ravi and Shalinie [ | ✓ | |||||
| Rate limiting | Sharma et al. [ | ✓ | ||||
| Traceback | Chen et al. [ | ✓ | ||||
| Request prioritization | Sarwar et al. [ | ✓ | ||||
| Flow filtering | Sahay et al. [ | ✓ | ||||
| Honeypots | Luo et al. [ | ✓ | ✓ | |||
| Hybrid SDN-Fog | Cosine similarity | Yin et al. [ | ✓ | |||
| Flow filtering | Özçelik et al. [ | ✓ | ✓ | |||
| Krishnan et al. [ | ✓ | |||||
| Hybrid SDN-Fog-Cloud | Flow filtering | Bhunia and Gurusamy [ | ✓ | ✓ | ||
| Nguyen et al. [ | ✓ | ✓ | ✓ | |||
| Rathore et al. [ | ✓ | ✓ | ✓ | |||
| MTD | Krishnan et al. [ | ✓ | ✓ | ✓ | ||
| Rate limiting | Yan et al. [ | ✓ | ✓ | |||
| Hybrid SDN-Blockchain | Traffic filtering | Houda et al. [ | ✓ |
Classification of mitigated Distributed Denial of Service (DDoS) attacks type by application scenarios.
| DDoS Attack | ||||
|---|---|---|---|---|
| Application Scenario | Proposal | Volumetric | Exhaustion | Application |
| SDN control plane | Xu et al. [ | ✓ | ||
| Krishnan et al. [ | ✓ | ✓ | ||
| Rafique et al. [ | ✓ | ✓ | ||
| Sarwar et al. [ | ✓ | |||
| Rafique et al. [ | ✓ | |||
| Smart Homes | Bhunia and Gurusamy [ | ✓ | ||
| Sharma et al. [ | ✓ | |||
| IoT Data Centers | Bawany and Shamsi [ | ✓ | ||
| Industrial IoT | Yan et al. [ | ✓ | ||
| Ship communication systems | Sahay et al. [ | ✓ | ||
| Generic | Bull et al. [ | ✓ | ✓ | |
| Özçelik et al. [ | ✓ | |||
| Yin et al. [ | ✓ | |||
| Krishnan et al. [ | ✓ | |||
| Salva-Garcia et al. [ | ✓ | ✓ | ||
| Nguyen et al. [ | ✓ | |||
| Rathore et al. [ | ✓ | ✓ | ||
| Yang et al. [ | ✓ | |||
| Houda et al. [ | ✓ | |||
| Luo et al. [ | ✓ | |||
| Chen et al. [ | ✓ | |||
| Nair et al. [ | ✓ | |||
| Galeano-Brajones et al. [ | ✓ | |||
| Ravi and Shalinie [ | ✓ | |||
Strategies employed in DDoS mitigation with low and high traffic rate.
| DDoS Traffic Rate | Mitigation Strategy |
|---|---|
| High rate | Honeypots |
| Rate limiting | |
| MTD | |
| Traceback | |
| Request prioritization | |
| Cosine similarity | |
| High and low rate | Traffic filtering with |
Figure 3Distribution of mitigation solutions for IoT scenarios.
Comparison between IoT scenario domains through advantages and disadvantages analysis.
| IoT Scenario | Advantages | Disadvantages |
|---|---|---|
| Generic |
Collaborative Provide secure communication between distributed nodes Mitigation in large and small scenarios Identify malicious devices in the network |
Do not consider low traffic rate attacks Validated only in small scenarios |
| SDN Control Plane |
Consider low and high traffic rate attacks |
Centralized mitigation on the network edge Non-Collaborative Do not identify malicious devices in the network Validated only in small scenarios |
| Smart Homes |
Lightweight and low cost solutions Identify malicious devices in the network |
Centralized mitigation on the network edge Non-Collaborative Validated only in small scenarios Do not consider low traffic rate attacks |
| Other Scenario |
Prioritizes applications by security requirements |
Centralized mitigation on the network edge Validated only in small scenarios Do not consider low traffic rate attacks |