Loading

Isolation of Distributed Denial of Service Attack using Threshold Based Technique in Internet of Things
Naveen Kumar1, Nitin Mittal2,Yogendra Naryan3

1Naveen Kumar, Research Scholar, Chandigarh University Gharuan, Mohali (Punjab), India.
2Dr. Nitin Mittal, Associate Professor, Chandigarh University Gharuan, Mohali (Punjab), India.
3Yogendra Naryan, Assistant Professor, Chandigarh University Gharuan, Mohali (Punjab), India.
Manuscript received on 13 June 2019 | Revised Manuscript received on 09 July 2019 | Manuscript Published on 17 July 2019 | PP: 87-93 | Volume-8 Issue-1C2 May 2019 | Retrieval Number: A10170581C219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The internet of things (IoT) is the network which is venerable to security attack. The security attacks affect the network performance in terms of various parameters. The DDOS attack is the active type of attack which reduces network performance. Generally, the cosine similarity technique is used for the isolation of malicious nodes that requires extra hardware for the isolation of malicious nodes. In this research work, the novel technique is proposed for the isolation of malicious nodes. The threshold based technique is proposed in this research work for the detection of malicious nodes from the network. . This technique uses the two parameters for the malicious node detection which are data rate and delay. In threshold based technique, the sensor nodes which increased delay above threshold value will be marked as malicious nodes.
Keywords: Cosine Similarity, DDOS, Threshold based Technique, IoT.
Scope of the Article: Internet of Things