Anomaly Detection In Iot Using Cooja Simulator
Abstract
Abstract
The idea of Internet of Things (IoT) is implanting networked heterogeneous detector in our daily life. It opens extra
channels for information submission and remote control to our physical world. A significant feature of IoT network
is that it collects data from network edges. Moreover, human involvement for network and devices maintenance is
greatly reduced, which suggest an IoT network to be highly self-manages and self-secured. For the reason that the use
of IoT is growing in many important fields, the security issues of IoT need to be properly addressed. Among all,
Distributed Denial of Service (DDoS) is one of the most notorious attacking behaviors over network which interrupt
and block genuine user requests by flooding the host server with huge number of requests using a group of zombie
computers via geographically distributed internet connections. DDoS disrupts service by creating network congestion
and disabling normal functions of network components, which is even more destructive for IoT.
Keywords: IoT, DDoS attack defensive mechanism, network communication simulation.
The idea of Internet of Things (IoT) is implanting networked heterogeneous detector in our daily life. It opens extra
channels for information submission and remote control to our physical world. A significant feature of IoT network
is that it collects data from network edges. Moreover, human involvement for network and devices maintenance is
greatly reduced, which suggest an IoT network to be highly self-manages and self-secured. For the reason that the use
of IoT is growing in many important fields, the security issues of IoT need to be properly addressed. Among all,
Distributed Denial of Service (DDoS) is one of the most notorious attacking behaviors over network which interrupt
and block genuine user requests by flooding the host server with huge number of requests using a group of zombie
computers via geographically distributed internet connections. DDoS disrupts service by creating network congestion
and disabling normal functions of network components, which is even more destructive for IoT.
Keywords: IoT, DDoS attack defensive mechanism, network communication simulation.
Full Text:
PDFRefbacks
- There are currently no refbacks.