Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT

8Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Society is faced with the ever more prominent concerns of vulnerabilities including hacking and DoS or DDoS attacks when migrating to new paradigms such as Internet of Things (IoT). These attacks against computer systems result in economic losses for businesses, public organizations and privacy disclosures. The IoT presents a new soft surface for attack. Vulnerability is now found in a multitude of personal and private devices that previously lacked connectivity. The ability to trace back to an attack origin is an important step in locating evidence that may be used to identify and prosecute those responsible. In this theoretical research, IP traceback methods are compared and evaluated for application, and then consolidated into a set of metrics for potential use against attackers.

Cite

CITATION STYLE

APA

Cusack, B., Tian, Z., & Kyaw, A. K. (2016). Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 190, pp. 127–138). Springer Verlag. https://doi.org/10.1007/978-3-319-52727-7_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free