Loading

A New Framework and Defensive Techniques for DDOS Attack on IoT
Feroz Khan A. B1, G. Anandharaj2
1Feroz Khan A.B, PG and Research Department of Computer Science, Adhiparasakthi College of Arts and Science, Vellore, India.
2Anandharaj G, PG and Research Department of Computer Science, Adhiparasakthi College of Arts and Science, Vellore, India.

Manuscript received on 16 April 2019 | Revised Manuscript received on 23 May 2019 | Manuscript published on 30 May 2019 | PP: 680-686 | Volume-8 Issue-1, May 2019 | Retrieval Number: F2814037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Internet of Things (IoT) comprised of interrelated things such as computing gadgets, wearable devices, handheld devices, digital machines, mechanical devices, people, objects, even animals that are provided with unique identifiers with the ability to send and receive data over a network without the need for human-to-human or human-to-computer interaction. A thing, in the Internet of Things can be anything on the planet, any object that can be assigned an IP address and provided with the ability to transfer data over a network.It is predicted that 50 billion devices will be associated with the Internet by 2020 and 500 billion by 2025 [14]. These associated gadgets – prominently known as the Internet of Things (IoT) that represent a great potential for the upgrade of social and business life and for market development. From wellness trackers and self-driving autos to shrewd broilers, automated home lighting, and air-conditioning system, there are innumerable new developments and buzz about these interconnected devices and arrangements. Some of them have even progressed toward becoming a piece of shoppers’ everyday life. Be that as it may, those are just a hint of a greater challenge. With this increase in accessibility, there is an increase in the need for strong security measures.The real work of this paper is that the conduct of various types of DDOS assaults found in IoT is demonstrated utilizing activity modeling and discovered counteragent against it. DDOS assault is one of the catastrophic assault which hinders the channel by sending a large amount of undesirable data constantly so as to flood a system. The action demonstrating of DDOS assault indicates all around obviously about how it executes on IoT environment and it is additionally helpful in building up the counteragent for security assault.This paper further presents the survey of IoT attacks and the counteragents against those attacks, also the paper introduces the new counteragent for DDOS attack. The new Threshold based Blocking Counteragent (TBC) is proposed in our work for the reply blocking attack. TBC detects the blocking in the network and prevents it from reply blocking attack. The proposed implementation in different realistic conditions perfectly shows that TBC helps IoT against reply blocking attack by varying the network traffic and adding the malicious nodes in a network. The proposed work clearly shows the good performance of the algorithm in various conditions such as mobility among secured nodes and malicious nodes, change of traffic interval.
Index terms: Activity Modelling, DDOS Attacks, Security Assaults Threshold Based Blocking Counteragent (TBC).

Scope of the Article: IoT