
Research Article
Toward Modeling of Flooding Attacks Targeting Massive IoT Networks
@INPROCEEDINGS{10.1007/978-3-031-84426-3_5, author={Jos\^{e} Ribeiro and Valdemar Monteiro and Jonathan Gonzalez}, title={Toward Modeling of Flooding Attacks Targeting Massive IoT Networks}, proceedings={Internet of Everything. Third EAI International Conference, IoECon 2024, Guimar\"{a}es, Portugal, September 26--27, 2024, Proceedings}, proceedings_a={IOECON}, year={2025}, month={3}, keywords={Massive IoT Networks Attack Modeling Anomaly-Based Intrusion Detection}, doi={10.1007/978-3-031-84426-3_5} }
- José Ribeiro
Valdemar Monteiro
Jonathan Gonzalez
Year: 2025
Toward Modeling of Flooding Attacks Targeting Massive IoT Networks
IOECON
Springer
DOI: 10.1007/978-3-031-84426-3_5
Abstract
During the current deployment of 5G networks, the researchers and engineers are now focus on the development of the 6G networks. The vision of the new 6G era is to offer a much wider range of applications compared to 5G by inter-connecting billions of IoT devices that can also build upcoming IoE ecosystems. Definitely, the unprecedented growth of 6G IoT devices along with the massive emergence of connections in the future 6G communication platform will increase the security vulnerabilities for the massive IoT networks, leading to a wide spectrum of known and unknown security threats. Therefore, there is an urgent need for developing novel security solutions for massive IoT networks, taking into consideration their resource-constrained limitations. In particular, considerable research efforts have recently been put into the design and development of light-weight Anomaly-based Intrusion Detection Systems (AIDSs). However, they cannot be widely applied in practice as they suffer from high false-positive rate, and thus more robust AIDSs are required to be developed. Toward this direction, in the EU-funded Marie Sklodowska-Curie REACT project, we developed attack behavior models which are important for analyzing and getting a comprehensive understanding of the behavior of attacks over time to predict their behavior and extract design specifications for more robust AIDSs. The focus of this work is on models for flooding attacks against massive IoT networks.