About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Everything. Third EAI International Conference, IoECon 2024, Guimarães, Portugal, September 26–27, 2024, Proceedings

Research Article

Toward Modeling of Flooding Attacks Targeting Massive IoT Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-84426-3_5,
        author={Jos\^{e} Ribeiro and Valdemar Monteiro and Jonathan Gonzalez},
        title={Toward Modeling of Flooding Attacks Targeting Massive IoT Networks},
        proceedings={Internet of Everything. Third EAI International Conference, IoECon 2024, Guimar\"{a}es, Portugal, September 26--27, 2024, Proceedings},
        proceedings_a={IOECON},
        year={2025},
        month={3},
        keywords={Massive IoT Networks Attack Modeling Anomaly-Based Intrusion Detection},
        doi={10.1007/978-3-031-84426-3_5}
    }
    
  • José Ribeiro
    Valdemar Monteiro
    Jonathan Gonzalez
    Year: 2025
    Toward Modeling of Flooding Attacks Targeting Massive IoT Networks
    IOECON
    Springer
    DOI: 10.1007/978-3-031-84426-3_5
José Ribeiro,*, Valdemar Monteiro, Jonathan Gonzalez
    *Contact email: jose@evotel-info.com

    Abstract

    During the current deployment of 5G networks, the researchers and engineers are now focus on the development of the 6G networks. The vision of the new 6G era is to offer a much wider range of applications compared to 5G by inter-connecting billions of IoT devices that can also build upcoming IoE ecosystems. Definitely, the unprecedented growth of 6G IoT devices along with the massive emergence of connections in the future 6G communication platform will increase the security vulnerabilities for the massive IoT networks, leading to a wide spectrum of known and unknown security threats. Therefore, there is an urgent need for developing novel security solutions for massive IoT networks, taking into consideration their resource-constrained limitations. In particular, considerable research efforts have recently been put into the design and development of light-weight Anomaly-based Intrusion Detection Systems (AIDSs). However, they cannot be widely applied in practice as they suffer from high false-positive rate, and thus more robust AIDSs are required to be developed. Toward this direction, in the EU-funded Marie Sklodowska-Curie REACT project, we developed attack behavior models which are important for analyzing and getting a comprehensive understanding of the behavior of attacks over time to predict their behavior and extract design specifications for more robust AIDSs. The focus of this work is on models for flooding attacks against massive IoT networks.

    Keywords
    Massive IoT Networks Attack Modeling Anomaly-Based Intrusion Detection
    Published
    2025-03-20
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-031-84426-3_5
    Copyright © 2024–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL