Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

作者: Charles Morisset , Luca Arnaboldi

DOI: 10.1007/978-3-319-68063-7_16

关键词:

摘要: Denial of Service (DoS) attacks constitute a major security threat to today’s Internet. This challenge is especially pertinent the Internet Things (IoT) as devices have less computing power, memory and mechanisms mitigate DoS attacks. paper presents model that mimics unique characteristics network IoT devices, including components system implementing ‘Crypto Puzzles’ - mitigation technique. We created an imitation attack on system, conducted quantitative analysis simulate impact such may potentially exert upon assessing trade off between throughput in system. this through stochastic checking PRISM provide evidence supports valuable method compare efficiency different implementations systems, exemplified by case study.

参考文章(16)
Kevin J. Houle, George M. Weaver, Trends in Denial of Service Attack Technology ,(2001)
Benjamin Aziz, A Formal Model and Analysis of an IoT Protocol ad hoc networks. ,vol. 36, pp. 49- 57 ,(2016) , 10.1016/J.ADHOC.2015.05.013
Peter Reiher, Sven Dietrich, Jelena Mirkovic, David Dittrich, Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) Prentice Hall PTR. ,(2004)
Joost-Pieter Katoen, Christel Baier, Principles of Model Checking ,(2008)
Petros Mouchtaris, Rajesh Talpade, Larry Wong, Sunil Madhani, Mitigating denial of service attacks ,(2004)
Matthias Fruth, Formal methods for the analysis of wireless network protocols University of Oxford. ,(2011)
Rene Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle, Tailoring end-to-end IP security protocols to the Internet of Things international conference on network protocols. pp. 1- 10 ,(2013) , 10.1109/ICNP.2013.6733571
Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou, Probabilistic model checking for the quantification of DoS security threats Computers & Security. ,vol. 28, pp. 450- 465 ,(2009) , 10.1016/J.COSE.2009.01.002
Mai Abdelhakim, Jian Ren, Tongtong Li, Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks 2014 IEEE Global Communications Conference. pp. 4616- 4621 ,(2014) , 10.1109/GLOCOM.2014.7037536
Hui Suo, Jiafu Wan, Caifeng Zou, Jianqi Liu, Security in the Internet of Things: A Review international conference on computer science and electronics engineering. ,vol. 3, pp. 648- 651 ,(2012) , 10.1109/ICCSEE.2012.373