Browsing by Author "Nasereddin, Mohammed"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Conference Object Citation - Scopus: 4Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed(IEEE COMPUTER SOC, 2023) Mohammed Nasereddin; Mert Nakip; Erol Gelenbe; Nakıp, Mert; Nasereddin, Mohammed; Gelenbe, Erol; E Bulut; F Tschorsch; K ThilakarathnaThe IoT is vulnerable to network attacks and Intrusion Detection Systems (IDS) can provide high attack detection accuracy and are easily installed in IoT Servers. However IDS are seldom evaluated in operational conditions which are seriously impaired by attack overload. Thus a Local Area Network test-bed is used to evaluate the impact of UDP Flood Attacks on an IoT Server whose first line of defence is an accurate IDS. We show that attacks overload the multi-core Server and paralyze its IDS. Thus a mitigation scheme that detects attacks rapidly and drops packets within milli-seconds after the attack begins is proposed and experimentally evaluated.Conference Object Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy(Institute of Electrical and Electronics Engineers Inc., 2023) Erol Gelenbe; Mohammed Nasereddin; Gelenbe, Erol; Nasereddin, Mohammed; J. Hu , G. Min , G. WangServers at Supply Chains and othet Cyber-physical systems that receive packets from IoT devices should meet the QoS needs of incoming packets and protect the system from Cyberattacks. UDP Floods are often included in attacks to overwhelm Supply Chains and the IoT through congestion that paralyzes their ability for timely Attack Detection and Mitigation. Thus this paper proposes an architecture that protects a connected Server using a Smart Quasi-Deterministic Transmission Policy Forwarder at its input. This Forwarder shapes the incoming traffic sends it to the Server without increasing the overall packet delay and avoids Server congestion. The relevant theoretical background is reviewed and measurements during a UDP Flood Attack are provided to compare the Server performance with and without the Forwarder. It is seen that during a UDP Flood Attack the Forwarder protects the Server from congestion allowing it to effectively identify Attack Packets. Congestion at the Forwarder is rapidly eliminated with "drop"commands generated by the Forwarder or sent by the Server to the Forwarder. © 2024 Elsevier B.V. All rights reserved.

