Visible to the public Design and Development of IOT Testbed with DDoS Attack for Cyber Security Research

TitleDesign and Development of IOT Testbed with DDoS Attack for Cyber Security Research
Publication TypeConference Paper
Year of Publication2021
AuthorsArthi, R, Krishnaveni, S
Conference Name2021 3rd International Conference on Signal Processing and Communication (ICPSC)
KeywordsData models, DDoS, DDoS attack detection, denial-of-service attack, DNS Attack, Human Behavior, Instruction sets, Intrusion detection, IoT, Manuals, Metrics, pubcrawl, Real-time Systems, resilience, Resiliency, Signal processing, Testbed for IOT
AbstractThe Internet of Things (IoT) is clubbed by networking of sensors and other embedded electronics. As more devices are getting connected, the vulnerability of getting affected by various IoT threats also increases. Among the IoT threads, DDoS attacks are causing serious issues in recent years. In IoT, these attacks are challenging to detect and isolate. Thus, an effective Intrusion Detection System (IDS) is essential to defend against these attacks. The traditional IDS is based on manual blacklisting. These methods are time-consuming and will not be effective to detect novel intrusions. At present, IDS are automated and programmed to be dynamic which are aided by machine learning & deep learning models. The performance of these models mainly depends on the data used to train the model. Majority of IDS study is performed with non-compatible and outdated datasets like KDD 99 and NSL KDD. Research on specific DDoS attack datasets is very less. Therefore, in this paper, we first aim to examine the effect of existing datasets in the IoT environment. Then, we propose a real-time data collection framework for DNS amplification attacks in IoT. The generated network packets containing DDoS attack is captured through port mirroring.
DOI10.1109/ICSPC51351.2021.9451786
Citation Keyarthi_design_2021