Interoperability, Safety and Security in IoT. Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers

Research Article

Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT

Download
1019 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-52727-7_14,
        author={Brian Cusack and Zhuang Tian and Ar Kyaw},
        title={Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT},
        proceedings={Interoperability, Safety and Security in IoT. Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers},
        proceedings_a={INTERIOT \& SASEIOT},
        year={2017},
        month={2},
        keywords={Attack origins DoS DDoS TTL Traceback IoT security},
        doi={10.1007/978-3-319-52727-7_14}
    }
    
  • Brian Cusack
    Zhuang Tian
    Ar Kyaw
    Year: 2017
    Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
    INTERIOT & SASEIOT
    Springer
    DOI: 10.1007/978-3-319-52727-7_14
Brian Cusack1,*, Zhuang Tian1,*, Ar Kyaw,*
  • 1: Auckland University of Technology
*Contact email: brian.cusack@aut.ac.nz, zhuang.tian@aut.ac.nz, arkar.kyaw@whitireia.ac.nz

Abstract

Society is faced with the ever more prominent concerns of vulnerabilities including hacking and DoS or DDoS attacks when migrating to new paradigms such as Internet of Things (IoT). These attacks against computer systems result in economic losses for businesses, public organizations and privacy disclosures. The IoT presents a new soft surface for attack. Vulnerability is now found in a multitude of personal and private devices that previously lacked connectivity. The ability to trace back to an attack origin is an important step in locating evidence that may be used to identify and prosecute those responsible. In this theoretical research, IP traceback methods are compared and evaluated for application, and then consolidated into a set of metrics for potential use against attackers.