Abstract
Today, many smart devices support IPv6 communication. IPv6 provides a larger address space capable to address up to 3.4x1038 devices. This is the reason why IoT devices have started addressing and networking in IPv6. However, a large number of IoT devices can be misused by hackers. A preferred method of attackers in recent years is the DDoS attack carried from IoT devices.
The main aim of this manuscript is to compare the behavior of commonly available IoT devices under a real DDoS reflection attack led in IPv4 and IPv6 networks and to analyse the potential of such attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cusack, B., Tian, Z., Kyaw, A.K.: Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT. In: Interoperability, Safety and Security in IoT, pp. 127–138. Springer, Cham (2016)
Srivastava, S., Pal, N.: Smart cities: the support for Internet of Things (IoT). Int. J. Comput. Appl. Eng. Sci. 6(1), 5, 5–7 (2016)
Ölvecký, M., Gabriška, D.: Motion capture as an extension of web-based simulation. Appl. Mech. Mater. 513, 827–833 (2014)
Horváthová, D., Siládi, V., Lacková, E.: Phobia treatment with the help of virtual reality. In: 13th International Scientific Conference on Informatics, pp. 114–119. IEEE (2015)
Hosťovecký, M., Novák, M., Horváthová, Z.: Problem-based learning: serious game in science education. In: ICEL 2017-Proceedings of the 12th International Conference on e-Learning. ACPI 2017, pp. 303–310 (2017)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Halenar, I., Juhasova, B., Juhas, M.: Proposal of communication standardization of industrial networks in Industry 4.0. In: IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES), pp. 119–124 (2016)
Habibi, J., Midi, D., Mudgerikar, A., Bertino, E.: Heimdall: mitigating the Internet of Insecure Things. IEEE Internet Things J. 4(4), 968–978 (2017)
Dirgová Luptáková, I., Pospíchal, J.: Community cut-off attack on malicious networks. In: Conference on Creativity in Intelligent Technologies and Data Science, pp. 697–708. Springer, Cham (2017)
Pishva, D.: IoT: their conveniences, security challenges and possible solutions. Adv. Sci. Technol. Eng. Syst. J. 2(3), 1211–1217 (2017)
Saad, R., et al.: Design & deployment of testbed based on ICMPv6 flooding attack. J. Theor. Appl. Inf. Technol. 64(3) (2014)
Singh, S., Gyanchandani, M.: Analysis of botnet behavior using queuing theory. Int. J. Comput. Sci. Commun. 1(2), 239–241 (2010)
Mansfield-Devine, S.: The growth and evolution of DDoS. Netw. Secur. 2015(10), 13–20 (2015)
Maksimović, M., Vujović, V., Davidović, N., Milošević, V., Perišić, B.: Raspberry Pi as Internet of Things hardware: performances and constraints. In: 1st International Conference on Electrical, Electronic and Computing Engineering - IcETRAN 2014, pp. ELI1.6.1-6 (2014)
Koopman, M.: Preventing Ransomware on the Internet of Things (2017). https://pdfs.semanticscholar.org/419f/8d22ba3eea1f4d9fbcd6b3b68d294504d276.pdf
Bastos, D., Shackleton, M., El-Moussa, F.: Internet of Things: a survey of technologies and security risks in smart home and city environments. In: International Conference Living in the Internet of Things: Cybersecurity of the IoT – 2018, London, UK (2018). https://doi.org/10.1049/cp.2018.0030
Tekeoglu, A., Tosun, A.S.: Investigating security and privacy of a cloud-based wireless IP camera: NetCam. In: IEEE 24th International Conference on Computer Communication and Networks (ICCCN), USA, pp. 1–6 (2015)
Kobayashi, T.H., et al.: Using a packet manipulation tool for security analysis of industrial network protocols. In: 2007 IEEE Conference on Emerging Technologies and Factory Automation, ETFA, IEEE (2007)
Šimon, M., Huraj, L., Čerňanský, M.: Performance evaluations of IPTables firewall solutions under DDoS attacks. J. Appl. Math. Stat. Inf. 11(2), 35–45 (2015)
Šimon, M., Huraj, L., Hosťovecký, M.: IPv6 network DDoS attack with P2P grid. In: Creativity in Intelligent, Technologies and Data Science, pp. 407–415. Springer, Cham (2015)
Conta, A., Gupta, M.: Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification. Request for Comments 4443 (2015)
Huraj, L., Šimon, M., Horák, T.: IoT measuring of UDP-based distributed reflective DoS attack. In: IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY 2018), pp. 209–214. IEEE, Serbia (2018)
Acknowledgements
The work was supported by the grant VEGA 1/0145/18 Optimization of network security by computational intelligence.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Šimon, M., Huraj, L. (2019). A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks. In: Silhavy, R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-19807-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19806-0
Online ISBN: 978-3-030-19807-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)