A THREE LAYER SECURITY APPROACH USING HONEYPOT TO MITIGATE DDOS ATTACK IN CLOUD-IOT ECOSYSYTEM

Md Mehedi Hasan, Md Hasibul Hassan

Abstract


With   an   increasing   number   of   security   threats, various  measures  have  been  taken  to  prevent  those  malicious events  from  happening  furthermore. Several  security  risks  in the  Internet  of  Things  (IoT)  have  been  identified,  assessed,  and addressed  as  well.  However,  yet  we  are  unable  to  prevent  the distributed  denial  of  service  (DDoS)  attacks  on  this  aspect  that, in turn, may hamper the production or other smart features built on  top  of  IoT.  Internet of Thing is a network paradigm which connects things (e.g., Smart Phones, Smart TV, Home Appliance, Cars, etc.) to the Internet. Therefore, in this paper, we present three-layer  approach  utilizing  honey pot  and  demilitarized  zone rules  to  mitigate  the  devastating  consequences  caused  by  DDoS in  the  cloud-IoT ecosystem. We have developed a framework and rule-based system to protect the internal/external network. In addition, the system can evaluate better outcome by enforcing modified rules in layers in case of DDoS attack.  The  simulation result,  along  with  the  packet  analysis,  reveals  that  the  layering of rule-based systems shows better result as we are only able to mitigate  the  threat

Keywords


IoT security, honey pot, DDoS attack, cloud

Full Text:

PDF

References


E. Hodo et al., “Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System,” pp. 4–9, 2020.

G. S. Matharu, “The Internet of Things : Challenges & Security Issues,” pp. 54–59, 2014.

B. P. Rimal, E. Choi, and I. Lumb, “Chapter 2 A Taxonomy , Survey , and Issues of Cloud Computing Ecosystems,” pp. 21–46, 2010, doi: 10.1007/978-1-84996-241-4.

D. J. Nallathambi, “Use of Honeypots for Mitigating DoS Attacks targeted on IoT Networks,” pp. 8–11, 2017.

S. M. Khattab, C. Sangpachatanaruk, D. Moss, and M. Taieb, “Roaming Honeypots for Mitigating Service-level Denial-of-Service Attacks ∗,” 2004.

V. V Das, “Honeypot Scheme for Distributed Denial-of-Service Attack,” doi: 10.1109/ICACC.2009.146.

L. M. Vaquero, L. Rodero-merino, J. Caceres, and M. Lindner, “A Break in the Clouds : Towards a Cloud Definition,” vol. 39, no. 1, pp. 50–55, 2009.

A. Behl, “Emerging Security Challenges in Cloud Computing An insight to Cloud security challenges and their mitigation,” pp. 217–222, 2011.

K. Shridhar and N. Gautam, “A Prevention of DDos Attacks in Cloud Using Honeypot,” vol. 3, no. 11, pp. 2378–2383, 2014.

N. Weiler, “Honeypots for Distributed Denial of Service Attacks,” 2002.

H. A. Deshpande, “HoneyMesh : Preventing Distributed Denial of Service Attacks using Virtualized Honeypots,” vol. 4, no. 08, pp. 263–267, 2015.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2019 International Educational Applied Scientific Research Journal