Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy

Loading...
Publication Logo

Date

2023

Authors

Erol Gelenbe
Mohammed Nasereddin

Journal Title

Journal ISSN

Volume Title

Publisher

Institute of Electrical and Electronics Engineers Inc.

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Servers at Supply Chains and othet Cyber-physical systems that receive packets from IoT devices should meet the QoS needs of incoming packets and protect the system from Cyberattacks. UDP Floods are often included in attacks to overwhelm Supply Chains and the IoT through congestion that paralyzes their ability for timely Attack Detection and Mitigation. Thus this paper proposes an architecture that protects a connected Server using a Smart Quasi-Deterministic Transmission Policy Forwarder at its input. This Forwarder shapes the incoming traffic sends it to the Server without increasing the overall packet delay and avoids Server congestion. The relevant theoretical background is reviewed and measurements during a UDP Flood Attack are provided to compare the Server performance with and without the Forwarder. It is seen that during a UDP Flood Attack the Forwarder protects the Server from congestion allowing it to effectively identify Attack Packets. Congestion at the Forwarder is rapidly eliminated with "drop"commands generated by the Forwarder or sent by the Server to the Forwarder. © 2024 Elsevier B.V. All rights reserved.

Description

Keywords

Intrusion Detection, Iot, Quasi-deterministic Transmission Policy (qdtp), Supply Chains, Traffic Shaping, Embedded Systems, Floods, Internet Of Things, Supply Chains, Cybe-physical Systems, Cyber-physical Systems, Deterministics, Flood Attacks, Incoming Packets, Intrusion-detection, Iot, Quasi-deterministic Transmission Policy, Traffic-shaping, Transmission Policy, Intrusion Detection, Embedded systems, Floods, Internet of things, Supply chains, Cybe-physical systems, Cyber-physical systems, Deterministics, Flood attacks, Incoming packets, Intrusion-Detection, IoT, Quasi-deterministic transmission policy, Traffic-shaping, Transmission policy, Intrusion detection, Quasi-Deterministic Transmission Policy (QDTP), Intrusion Detection, Traffic Shaping, Supply Chains, IoT, Computer Science - Networking and Internet Architecture, Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, Supply Chains, IoT, Traffic Shaping, Computer Science - Cryptography and Security, Quasi-Deterministic Transmission Policy (QDTP), Cryptography and Security (cs.CR), Intrusion Detection

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
1

Source

22nd IEEE International Conference on Trust Security and Privacy in Computing and Communications TrustCom 2023

Volume

Issue

Start Page

379

End Page

386
PlumX Metrics
Citations

Scopus : 0

Captures

Mendeley Readers : 10

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.6002

Sustainable Development Goals