Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices

8Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the of utilizing IoT devices increasing recently, such devices are being infected with malicious codes and being used to carry out DDoS attacks. In particular, there have been cases of large-scale DDoS reflex attacks of 100GB or more using IoT devices such as wireless sharing devices, CCTVs and smart cars. There is a vulnerability that is being exploited for attacks through Simple Service Discovery Protocol (SSDP) to search for IoT devices. This study examines different types of IoT devices used in DDoS attacks, and conducts experiments in which reflection DDoS attacks are carried out on IoT devices in order to measure the attack threat levels. This study also suggests methods that IoT service operators can employ to remove IoT device vulnerabilities, as well as effective countermeasures that Internet service operators can apply to address reflection DDoS attacks that exploit IoT devices.

Cite

CITATION STYLE

APA

Lee, Y. joon, Chae, H. sung, & Lee, K. wang. (2021). Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices. Automatika, 62(1), 127–136. https://doi.org/10.1080/00051144.2021.1885587

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free