Skip to main content
Erschienen in: Wireless Personal Communications 4/2020

23.01.2020

An Intrusion Detection System on Ping of Death Attacks in IoT Networks

verfasst von: Asrin Abdollahi, Mohammad Fathi

Erschienen in: Wireless Personal Communications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of things (IoT) is almost vulnerable to cyber security attacks due to the limited computational resources of conventional IoT devices. In this paper, ping of death as a cyber security attack is modeled for IoT networks. Attackers increase the length of transmit packets intentionally in order to degrade the network resources. To mitigate ping of death attacks, an intrusion detection system (IDS) is designed to be included in the network gateway to detect attacks and to filter out the over-length packets. The IDS relies on an integer optimization problem minimizing the false alarm probability while maintaining the missed detection probability below a desired level. The problem is solved using a search method. Simulation results demonstrate the impact of the proposed IDS by not allowing the gateway queue lengths to grow unexpectedly and to maintain queues at a normal level. Furthermore, simulation results provide a guideline for the network administrator to configure the IDS parameters such a normal packet length.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Al-Shargabi, B, & Sabri, O. (2017). Internet of things: An exploration study of opportunities and challenges. In 2017 international conference on engineering & MIS (ICEMIS) on IEEE, 2017. Al-Shargabi, B, & Sabri, O. (2017). Internet of things: An exploration study of opportunities and challenges. In 2017 international conference on engineering & MIS (ICEMIS) on IEEE, 2017.
3.
Zurück zum Zitat Hao, C., Xueqin, J., & Heng, L. (2011). A brief introduction to IoT gateway. In IET international conference on communication technology and application (ICCTA 2011) (pp. 610–613). Hao, C., Xueqin, J., & Heng, L. (2011). A brief introduction to IoT gateway. In IET international conference on communication technology and application (ICCTA 2011) (pp. 610–613).
4.
Zurück zum Zitat Samuel, S. S. I. (2016). A review of connectivity challenges in IoT-smart home. In 3rd MEC international conference on big data and smart city, IEEE conferences, 2016. Samuel, S. S. I. (2016). A review of connectivity challenges in IoT-smart home. In 3rd MEC international conference on big data and smart city, IEEE conferences, 2016.
5.
Zurück zum Zitat Rayes, A., & Salam, S. (2017). Internet of things security and privacy. In Springer, 2017 (pp. 211–238). Rayes, A., & Salam, S. (2017). Internet of things security and privacy. In Springer, 2017 (pp. 211–238).
6.
Zurück zum Zitat Kibirige, G. W., & Sanga, C. (2015). A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:1505.01941. Kibirige, G. W., & Sanga, C. (2015). A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:​1505.​01941.
7.
Zurück zum Zitat Keshri, A., Singh, S., Agarwal, M., & Nandiy, S. K. (2016). DoS attacks prevention using IDS and data mining. In 2016 international conference on accessibility to digital world (ICADW), IEEE conferences (pp. 87–92). Keshri, A., Singh, S., Agarwal, M., & Nandiy, S. K. (2016). DoS attacks prevention using IDS and data mining. In 2016 international conference on accessibility to digital world (ICADW), IEEE conferences (pp. 87–92).
9.
Zurück zum Zitat Brachmann, M., Keoh, S. L., Morchon, O. G., & Kumar, S. S. (2012). End-to-end transport security in the IP-based internet of things. In 21st international conference on computer communications and networks (ICCCN), 2012. Brachmann, M., Keoh, S. L., Morchon, O. G., & Kumar, S. S. (2012). End-to-end transport security in the IP-based internet of things. In 21st international conference on computer communications and networks (ICCCN), 2012.
10.
Zurück zum Zitat Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight Secure CoAP for the internet of things. IEEE Sensors Journal,13, 3711–3720.CrossRef Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight Secure CoAP for the internet of things. IEEE Sensors Journal,13, 3711–3720.CrossRef
11.
Zurück zum Zitat Raza, S., Trabalza, D., & Voigt, T. (2012). 6lowpan compressed DTLS for CoAP. In 2012 IEEE 8th international conference on distributed computing in sensor systems (pp. 287–289). Raza, S., Trabalza, D., & Voigt, T. (2012). 6lowpan compressed DTLS for CoAP. In 2012 IEEE 8th international conference on distributed computing in sensor systems (pp. 287–289).
12.
Zurück zum Zitat Kumar, V., & Tiwari, S. (2012). Routing in IPv6 over low-power wireless personal area networks (6LoWPAN): A survey. Journal of Computer Networks and Communications, 1–11. Kumar, V., & Tiwari, S. (2012). Routing in IPv6 over low-power wireless personal area networks (6LoWPAN): A survey. Journal of Computer Networks and Communications, 1–11.
13.
Zurück zum Zitat Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In Distributed computing in sensor systems and workshops (DCOSS) (pp. 1–8). Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In Distributed computing in sensor systems and workshops (DCOSS) (pp. 1–8).
14.
Zurück zum Zitat Pharate, A., & Bhat, B. (2015). Classification of intrusion detection system. International Journal of Computer Applications,118(17), 0975–8887. Pharate, A., & Bhat, B. (2015). Classification of intrusion detection system. International Journal of Computer Applications,118(17), 0975–8887.
15.
Zurück zum Zitat Ioulianou, P., Vasileios, V., Ioannis, M., & Michael, L. (2018). A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form. Ioulianou, P., Vasileios, V., Ioannis, M., & Michael, L. (2018). A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form.
16.
Zurück zum Zitat Ukil, A., Bandyoapdhyay, S., Puri, C., & Pal, A. (2016). IoT healthcare analytics: The importance of anomaly detection. In 2016 IEEE 30th international conference on advanced information networking and applications (AINA) (pp. 994–997). Ukil, A., Bandyoapdhyay, S., Puri, C., & Pal, A. (2016). IoT healthcare analytics: The importance of anomaly detection. In 2016 IEEE 30th international conference on advanced information networking and applications (AINA) (pp. 994–997).
17.
Zurück zum Zitat Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information,7(2), 25.CrossRef Le, A., Loo, J., Chai, K., & Aiash, M. (2016). A specification-based IDS for detecting attacks on RPL-based network topology. Information,7(2), 25.CrossRef
18.
Zurück zum Zitat Sedjelmaci, H., Senouci, S. M., & Al-Bahri, M. (2016). A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology. In 2016 IEEE international conference on communications (ICC), 2016. Sedjelmaci, H., Senouci, S. M., & Al-Bahri, M. (2016). A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology. In 2016 IEEE international conference on communications (ICC), 2016.
19.
Zurück zum Zitat Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks,11, 2661–2674.CrossRef Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks,11, 2661–2674.CrossRef
20.
Zurück zum Zitat Raza, S., Duquennoy, S., Höglund, J., & Voigt, U. R. A. T. (2012). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LowPAN. Security and Communication Networks,7(12), 2654–2668.CrossRef Raza, S., Duquennoy, S., Höglund, J., & Voigt, U. R. A. T. (2012). Secure communication for the Internet of Things a comparison of link-layer security and IPsec for 6LowPAN. Security and Communication Networks,7(12), 2654–2668.CrossRef
21.
Zurück zum Zitat Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. In 2015 IFIP/IEEE international symposium on integrated network management (IM), 2015. Cervantes, C., Poplade, D., Nogueira, M., & Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. In 2015 IFIP/IEEE international symposium on integrated network management (IM), 2015.
22.
Zurück zum Zitat Surendar, M., & Umamakeswari, A. (2016). InDReS: An intrusion detection and response system for Internet of Things with 6LoWPAN. In Proceedings of 2016 IEEE international conference on wireless communications signal processing and networking (pp. 903–1908). Surendar, M., & Umamakeswari, A. (2016). InDReS: An intrusion detection and response system for Internet of Things with 6LoWPAN. In Proceedings of 2016 IEEE international conference on wireless communications signal processing and networking (pp. 903–1908).
23.
Zurück zum Zitat Yan, K., Wang, S., Wang, S., & Liu, C. (2010). Hybrid intrusion detection system for enhancing the security of a cluster-based. In 2010 3rd international conference on computer science and information technology (Vol. 1, pp. 114–118). Yan, K., Wang, S., Wang, S., & Liu, C. (2010). Hybrid intrusion detection system for enhancing the security of a cluster-based. In 2010 3rd international conference on computer science and information technology (Vol. 1, pp. 114–118).
24.
Zurück zum Zitat Sedjelmaci, H., Senouci, S., & Taleb, T. (2017). An accurate security game for low-resource IoT devices. IEEE Transactions on Vehicular Technology,66(10), 9381–9393.CrossRef Sedjelmaci, H., Senouci, S., & Taleb, T. (2017). An accurate security game for low-resource IoT devices. IEEE Transactions on Vehicular Technology,66(10), 9381–9393.CrossRef
25.
Zurück zum Zitat Stolyar, A. L. (2005). Maximizing queuing network utility subject to stability: Greedy primal–dual algorithm. Queueing Systems,50(4), 401–457.MathSciNetCrossRef Stolyar, A. L. (2005). Maximizing queuing network utility subject to stability: Greedy primal–dual algorithm. Queueing Systems,50(4), 401–457.MathSciNetCrossRef
Metadaten
Titel
An Intrusion Detection System on Ping of Death Attacks in IoT Networks
verfasst von
Asrin Abdollahi
Mohammad Fathi
Publikationsdatum
23.01.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07139-y

Weitere Artikel der Ausgabe 4/2020

Wireless Personal Communications 4/2020 Zur Ausgabe

Neuer Inhalt