Visible to the public Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT

TitleUsing MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Publication TypeConference Paper
Year of Publication2019
AuthorsLuo, Xupeng, Yan, Qiao, Wang, Mingde, Huang, Wenyao
Conference Name2019 Computing, Communications and IoT Applications (ComComAp)
Date Publishedoct
KeywordsBotnet, Computer crime, computer network security, DDoS Attack, defend DDoS attacks, distributed denial of service attacks, honey pots, honeypot, human factors, Internet of Things, invasive software, IoT devices, IoT security, IP networks, Malware, malwares, moving target defense architecture, MTD, network assest, pubcrawl, Resiliency, Scalability, SDN, SDN-based honeypots, Servers, software defined networking, software-defined networking
AbstractWith the rapid development of Internet of Things (IoT), distributed denial of service (DDoS) attacks become the important security threat of the IoT. Characteristics of IoT, such as large quantities and simple function, which have easily caused the IoT devices or servers to be attacked and be turned into botnets for launching DDoS attacks. In this paper, we use software-defined networking (SDN) to develop moving target defense (MTD) architecture that increases uncertainty because of ever changing attack surface. In addition, we deploy SDN-based honeypots to mimic IoT devices, luring attackers and malwares. Finally, experimental results show that combination of MTD and SDN-based honeypots can effectively hide network asset from scanner and defend against DDoS attacks in IoT.
DOI10.1109/ComComAp46287.2019.9018775
Citation Keyluo_using_2019