Abstract
A smart home uses notifications to notify the user of events that have occurred in the home via mobile devices such as smartphones. Some events are important, and the user must be notified about them immediately. The functionality of a smart home can be disrupted by various attacks. Such attacks also include a DDoS attack when the household network is usually completely overwhelmed and any communication in the network is interrupted. An attacker can conduct a more sophisticated DDoS attack on only one IoT device, while the effort is to overwhelm only one IoT device and thus disable only part of the smart home services. In this article, the behavior of the system during a targeted DDoS attack on the device is experimentally demonstrated on one of the latest control units for managing the smart home, Fibaro Home Center 3, and the ability of the smart home to continue sending important notifications to the user without using cloud services is monitored. A countermeasure against such a targeted DDoS attack is proposed, which will allow the owner of a smart home to continue receiving notifications about activities in the home.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mazhar, M.H., Shafiq, Z.: Characterizing smart home IoT traffic in the wild. In: 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE (2020)
Baligar, S., Sabade, A., Gurtu, S., Joshi, C.: A QOS-aware secure personal cloud storage with ubiquitous access and smart home extension. In: 2015 International Conference on Computer, Communication and Control (IC4). IEEE (2015)
Ansari, S., Kumar, A.: Traffic privacy study on Internet of Things-Smart home applications. In: 2021 9th International Conference on Cyber and IT Service Management (CITSM). IEEE (2021)
Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 1–17 (2018)
Korytar, M., Gabriska, D.: Integrated security levels and analysis of their implications to the maintenance. J. Appl. Math. Stat. Inf. 10(2), 33–42 (2014)
Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H.H., Radford, A., Sivaraman, V.: Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 46–51
Sivaraman, V., Gharakheili, H.H., Fernandes, C., Clark, N., Karliychuk, T.: Smart IoT devices in the home: security and privacy implications. IEEE Technol. Soc. Mag. 37, 71–79 (2018)
Efe, A., Aksöz, E., Hanecioğlu, N., Yalman, ŞN.: Smart security of IoT against to DDoS attacks. Uluslar. Yenilikçi Mühendis. Uygul. Derg. 2, 35–43 (2018)
Overstreet, D., Wimmer, H., Haddad, R.J.: Penetration testing of the amazon echo digital voice assistant using a denial-of-service attack. In: Proceedings of the 2019 SoutheastCon, Huntsville, AL, USA, 11–14 Apr 2019, pp. 1–6
Saxena, U., Sodhi, J.S., Singh, Y.: An analysis of DDoS attacks in a smart home networks. In: Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 Jan 2020, pp. 272–276
Huraj, L., Šimon, M., Horák, T.: Resistance of IoT sensors against DDoS attack in smart home environment. Sensors 20(18), 5298 (2020)
Sultania, A.K., Mahfoudhi, F., Famaey, J.: Real-Time demand-response using NB-IoT. IEEE Internet Things J. 7(12), 11863–11872 (2020)
Bogdanoski, M., Suminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 1–11 (2013)
Chauhan, V., Saini, P. ICMP flood attacks: A vulnerability analysis. Cyber Security. Springer, Singapore, 2018. 261–268
Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput. Secur. 65, 344–372 (2017)
Low orbit ion cannon, [online] Available: https://sourceforge.net/projects/loic/. Accessed 17 June 2022
Badhwar, R.: Distributed denial of service (DDoS) protection. In: The CISO’s Next Frontier. pp. 231–236. Springer, Cham (2021)
Kemp, C., Calvert, C., Khoshgoftaar, T.M.: Detecting slow application-layer DoS attacks with PCA. In: 2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI), pp. 176–183. IEEE (2021)
Horák, T., et al.: Vulnerability of smart IoT-Based automation and control devices to cyber attacks. In: Computer Science On-line Conference. Springer, Cham (2020)
Wang, A., Mohaisen, A., Chen, S.: XLF: A cross-layer framework to secure the internet of things (iot). In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE (2019)
Apthorpe, N., Reisman, D., Feamster, N.: Closing the blinds: four strategies for protecting smart home privacy from network observers. arXiv preprint arXiv:1705.06809 (2017)
Apthorpe, N., Huang, D.Y., Reisman, D., Narayanan, A., Feamster, N.: Keeping the smart home private with Smart(er) IoT traffic shaping. Proc. Priv. Enhancing Technol. 2019(3), 128–148 (2019). https://doi.org/10.2478/popets-2019-0040
Acknowledgements
The work was funded by the grant KEGA 012UCM-4/2021 Modern technologies and innovations in network security education.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Huraj, L., Simon, M., Lietava, J. (2023). Smart Home Defense Against DDoS Attacks. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Data Science and Algorithms in Systems. CoMeSySo 2022. Lecture Notes in Networks and Systems, vol 597. Springer, Cham. https://doi.org/10.1007/978-3-031-21438-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-21438-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21437-0
Online ISBN: 978-3-031-21438-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)