Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy
Loading...

Date
2023
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electrical and Electronics Engineers Inc.
Open Access Color
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
Servers at Supply Chains and othet Cyber-physical systems that receive packets from IoT devices should meet the QoS needs of incoming packets and protect the system from Cyberattacks. UDP Floods are often included in attacks to overwhelm Supply Chains and the IoT through congestion that paralyzes their ability for timely Attack Detection and Mitigation. Thus this paper proposes an architecture that protects a connected Server using a Smart Quasi-Deterministic Transmission Policy Forwarder at its input. This Forwarder shapes the incoming traffic sends it to the Server without increasing the overall packet delay and avoids Server congestion. The relevant theoretical background is reviewed and measurements during a UDP Flood Attack are provided to compare the Server performance with and without the Forwarder. It is seen that during a UDP Flood Attack the Forwarder protects the Server from congestion allowing it to effectively identify Attack Packets. Congestion at the Forwarder is rapidly eliminated with "drop"commands generated by the Forwarder or sent by the Server to the Forwarder. © 2024 Elsevier B.V. All rights reserved.
Description
Keywords
Intrusion Detection, Iot, Quasi-deterministic Transmission Policy (qdtp), Supply Chains, Traffic Shaping, Embedded Systems, Floods, Internet Of Things, Supply Chains, Cybe-physical Systems, Cyber-physical Systems, Deterministics, Flood Attacks, Incoming Packets, Intrusion-detection, Iot, Quasi-deterministic Transmission Policy, Traffic-shaping, Transmission Policy, Intrusion Detection, Embedded systems, Floods, Internet of things, Supply chains, Cybe-physical systems, Cyber-physical systems, Deterministics, Flood attacks, Incoming packets, Intrusion-Detection, IoT, Quasi-deterministic transmission policy, Traffic-shaping, Transmission policy, Intrusion detection, Quasi-Deterministic Transmission Policy (QDTP), Intrusion Detection, Traffic Shaping, Supply Chains, IoT, Computer Science - Networking and Internet Architecture, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Supply Chains, IoT, Traffic Shaping, Computer Science - Cryptography and Security, Quasi-Deterministic Transmission Policy (QDTP), Cryptography and Security (cs.CR), Intrusion Detection
Fields of Science
0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
1
Source
22nd IEEE International Conference on Trust Security and Privacy in Computing and Communications TrustCom 2023
Volume
Issue
Start Page
379
End Page
386
PlumX Metrics
Citations
Scopus : 0
Captures
Mendeley Readers : 10
Google Scholar™


