Skip to main content

A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks

  • Conference paper
  • First Online:
Software Engineering Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 984))

Included in the following conference series:

Abstract

Today, many smart devices support IPv6 communication. IPv6 provides a larger address space capable to address up to 3.4x1038 devices. This is the reason why IoT devices have started addressing and networking in IPv6. However, a large number of IoT devices can be misused by hackers. A preferred method of attackers in recent years is the DDoS attack carried from IoT devices.

The main aim of this manuscript is to compare the behavior of commonly available IoT devices under a real DDoS reflection attack led in IPv4 and IPv6 networks and to analyse the potential of such attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cusack, B., Tian, Z., Kyaw, A.K.: Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT. In: Interoperability, Safety and Security in IoT, pp. 127–138. Springer, Cham (2016)

    Chapter  Google Scholar 

  2. Srivastava, S., Pal, N.: Smart cities: the support for Internet of Things (IoT). Int. J. Comput. Appl. Eng. Sci. 6(1), 5, 5–7 (2016)

    Google Scholar 

  3. Ölvecký, M., Gabriška, D.: Motion capture as an extension of web-based simulation. Appl. Mech. Mater. 513, 827–833 (2014)

    Article  Google Scholar 

  4. Horváthová, D., Siládi, V., Lacková, E.: Phobia treatment with the help of virtual reality. In: 13th International Scientific Conference on Informatics, pp. 114–119. IEEE (2015)

    Google Scholar 

  5. Hosťovecký, M., Novák, M., Horváthová, Z.: Problem-based learning: serious game in science education. In: ICEL 2017-Proceedings of the 12th International Conference on e-Learning. ACPI 2017, pp. 303–310 (2017)

    Google Scholar 

  6. Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)

    Article  Google Scholar 

  7. Halenar, I., Juhasova, B., Juhas, M.: Proposal of communication standardization of industrial networks in Industry 4.0. In: IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES), pp. 119–124 (2016)

    Google Scholar 

  8. Habibi, J., Midi, D., Mudgerikar, A., Bertino, E.: Heimdall: mitigating the Internet of Insecure Things. IEEE Internet Things J. 4(4), 968–978 (2017)

    Article  Google Scholar 

  9. Dirgová Luptáková, I., Pospíchal, J.: Community cut-off attack on malicious networks. In: Conference on Creativity in Intelligent Technologies and Data Science, pp. 697–708. Springer, Cham (2017)

    Google Scholar 

  10. Pishva, D.: IoT: their conveniences, security challenges and possible solutions. Adv. Sci. Technol. Eng. Syst. J. 2(3), 1211–1217 (2017)

    Article  Google Scholar 

  11. Saad, R., et al.: Design & deployment of testbed based on ICMPv6 flooding attack. J. Theor. Appl. Inf. Technol. 64(3) (2014)

    Google Scholar 

  12. Singh, S., Gyanchandani, M.: Analysis of botnet behavior using queuing theory. Int. J. Comput. Sci. Commun. 1(2), 239–241 (2010)

    Google Scholar 

  13. Mansfield-Devine, S.: The growth and evolution of DDoS. Netw. Secur. 2015(10), 13–20 (2015)

    Article  Google Scholar 

  14. Maksimović, M., Vujović, V., Davidović, N., Milošević, V., Perišić, B.: Raspberry Pi as Internet of Things hardware: performances and constraints. In: 1st International Conference on Electrical, Electronic and Computing Engineering - IcETRAN 2014, pp. ELI1.6.1-6 (2014)

    Google Scholar 

  15. Koopman, M.: Preventing Ransomware on the Internet of Things (2017). https://pdfs.semanticscholar.org/419f/8d22ba3eea1f4d9fbcd6b3b68d294504d276.pdf

  16. Bastos, D., Shackleton, M., El-Moussa, F.: Internet of Things: a survey of technologies and security risks in smart home and city environments. In: International Conference Living in the Internet of Things: Cybersecurity of the IoT – 2018, London, UK (2018). https://doi.org/10.1049/cp.2018.0030

  17. Tekeoglu, A., Tosun, A.S.: Investigating security and privacy of a cloud-based wireless IP camera: NetCam. In: IEEE 24th International Conference on Computer Communication and Networks (ICCCN), USA, pp. 1–6 (2015)

    Google Scholar 

  18. Kobayashi, T.H., et al.: Using a packet manipulation tool for security analysis of industrial network protocols. In: 2007 IEEE Conference on Emerging Technologies and Factory Automation, ETFA, IEEE (2007)

    Google Scholar 

  19. Šimon, M., Huraj, L., Čerňanský, M.: Performance evaluations of IPTables firewall solutions under DDoS attacks. J. Appl. Math. Stat. Inf. 11(2), 35–45 (2015)

    Google Scholar 

  20. Šimon, M., Huraj, L., Hosťovecký, M.: IPv6 network DDoS attack with P2P grid. In: Creativity in Intelligent, Technologies and Data Science, pp. 407–415. Springer, Cham (2015)

    Google Scholar 

  21. Conta, A., Gupta, M.: Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification. Request for Comments 4443 (2015)

    Google Scholar 

  22. Huraj, L., Šimon, M., Horák, T.: IoT measuring of UDP-based distributed reflective DoS attack. In: IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY 2018), pp. 209–214. IEEE, Serbia (2018)

    Google Scholar 

Download references

Acknowledgements

The work was supported by the grant VEGA 1/0145/18 Optimization of network security by computational intelligence.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ladislav Huraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Šimon, M., Huraj, L. (2019). A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks. In: Silhavy, R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_12

Download citation

Publish with us

Policies and ethics