Skip to main content

Smart Home Defense Against DDoS Attacks

  • Conference paper
  • First Online:
Data Science and Algorithms in Systems (CoMeSySo 2022)

Abstract

A smart home uses notifications to notify the user of events that have occurred in the home via mobile devices such as smartphones. Some events are important, and the user must be notified about them immediately. The functionality of a smart home can be disrupted by various attacks. Such attacks also include a DDoS attack when the household network is usually completely overwhelmed and any communication in the network is interrupted. An attacker can conduct a more sophisticated DDoS attack on only one IoT device, while the effort is to overwhelm only one IoT device and thus disable only part of the smart home services. In this article, the behavior of the system during a targeted DDoS attack on the device is experimentally demonstrated on one of the latest control units for managing the smart home, Fibaro Home Center 3, and the ability of the smart home to continue sending important notifications to the user without using cloud services is monitored. A countermeasure against such a targeted DDoS attack is proposed, which will allow the owner of a smart home to continue receiving notifications about activities in the home.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mazhar, M.H., Shafiq, Z.: Characterizing smart home IoT traffic in the wild. In: 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE (2020)

    Google Scholar 

  2. Baligar, S., Sabade, A., Gurtu, S., Joshi, C.: A QOS-aware secure personal cloud storage with ubiquitous access and smart home extension. In: 2015 International Conference on Computer, Communication and Control (IC4). IEEE (2015)

    Google Scholar 

  3. Ansari, S., Kumar, A.: Traffic privacy study on Internet of Things-Smart home applications. In: 2021 9th International Conference on Cyber and IT Service Management (CITSM). IEEE (2021)

    Google Scholar 

  4. Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 1–17 (2018)

    Google Scholar 

  5. Korytar, M., Gabriska, D.: Integrated security levels and analysis of their implications to the maintenance. J. Appl. Math. Stat. Inf. 10(2), 33–42 (2014)

    MATH  Google Scholar 

  6. Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H.H., Radford, A., Sivaraman, V.: Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 46–51

    Google Scholar 

  7. Sivaraman, V., Gharakheili, H.H., Fernandes, C., Clark, N., Karliychuk, T.: Smart IoT devices in the home: security and privacy implications. IEEE Technol. Soc. Mag. 37, 71–79 (2018)

    Article  Google Scholar 

  8. Efe, A., Aksöz, E., Hanecioğlu, N., Yalman, ŞN.: Smart security of IoT against to DDoS attacks. Uluslar. Yenilikçi Mühendis. Uygul. Derg. 2, 35–43 (2018)

    Google Scholar 

  9. Overstreet, D., Wimmer, H., Haddad, R.J.: Penetration testing of the amazon echo digital voice assistant using a denial-of-service attack. In: Proceedings of the 2019 SoutheastCon, Huntsville, AL, USA, 11–14 Apr 2019, pp. 1–6

    Google Scholar 

  10. Saxena, U., Sodhi, J.S., Singh, Y.: An analysis of DDoS attacks in a smart home networks. In: Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 Jan 2020, pp. 272–276

    Google Scholar 

  11. Huraj, L., Šimon, M., Horák, T.: Resistance of IoT sensors against DDoS attack in smart home environment. Sensors 20(18), 5298 (2020)

    Article  Google Scholar 

  12. Sultania, A.K., Mahfoudhi, F., Famaey, J.: Real-Time demand-response using NB-IoT. IEEE Internet Things J. 7(12), 11863–11872 (2020)

    Article  Google Scholar 

  13. Bogdanoski, M., Suminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 1–11 (2013)

    Google Scholar 

  14. Chauhan, V., Saini, P. ICMP flood attacks: A vulnerability analysis. Cyber Security. Springer, Singapore, 2018. 261–268

    Google Scholar 

  15. Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput. Secur. 65, 344–372 (2017)

    Article  Google Scholar 

  16. Low orbit ion cannon, [online] Available: https://sourceforge.net/projects/loic/. Accessed 17 June 2022

  17. Badhwar, R.: Distributed denial of service (DDoS) protection. In: The CISO’s Next Frontier. pp. 231–236. Springer, Cham (2021)

    Google Scholar 

  18. Kemp, C., Calvert, C., Khoshgoftaar, T.M.: Detecting slow application-layer DoS attacks with PCA. In: 2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI), pp. 176–183. IEEE (2021)

    Google Scholar 

  19. Horák, T., et al.: Vulnerability of smart IoT-Based automation and control devices to cyber attacks. In: Computer Science On-line Conference. Springer, Cham (2020)

    Google Scholar 

  20. Wang, A., Mohaisen, A., Chen, S.: XLF: A cross-layer framework to secure the internet of things (iot). In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE (2019)

    Google Scholar 

  21. Apthorpe, N., Reisman, D., Feamster, N.: Closing the blinds: four strategies for protecting smart home privacy from network observers. arXiv preprint arXiv:1705.06809 (2017)

  22. Apthorpe, N., Huang, D.Y., Reisman, D., Narayanan, A., Feamster, N.: Keeping the smart home private with Smart(er) IoT traffic shaping. Proc. Priv. Enhancing Technol. 2019(3), 128–148 (2019). https://doi.org/10.2478/popets-2019-0040

    Article  Google Scholar 

Download references

Acknowledgements

The work was funded by the grant KEGA 012UCM-4/2021 Modern technologies and innovations in network security education.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ladislav Huraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huraj, L., Simon, M., Lietava, J. (2023). Smart Home Defense Against DDoS Attacks. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Data Science and Algorithms in Systems. CoMeSySo 2022. Lecture Notes in Networks and Systems, vol 597. Springer, Cham. https://doi.org/10.1007/978-3-031-21438-7_27

Download citation

Publish with us

Policies and ethics