Impact Evaluation of DDoS Attacks Using IoT Devices

Ronierison Maciel, J. Araujo, Carlos Melo, Paulo Pereira, J. Dantas, Júlio Mendonça, P. Maciel
{"title":"Impact Evaluation of DDoS Attacks Using IoT Devices","authors":"Ronierison Maciel, J. Araujo, Carlos Melo, Paulo Pereira, J. Dantas, Júlio Mendonça, P. Maciel","doi":"10.1109/SysCon48628.2021.9447145","DOIUrl":null,"url":null,"abstract":"Distributed Denial-of-Service (DDoS) attacks can occur anytime, everywhere, and most normally occur with little or no warning. Most small and medium businesses (SMBs) usually are not prepared to deal with this type of attack. The companies must have at least a bandwidth higher than the attack, an infrastructure with redundant components, regular backups, and firewalls capable of monitoring the threats. Otherwise, the services provided by the companies’ support can be interrupted, increasing the chances of financial losses. Hierarchical modeling approaches are often used to evaluate the availability of such systems. It can represent different failures and repair events in distinct parts of the system. In this way, this paper proposes hierarchical models that describe the behavior of major IT systems and IoT device components and assess the DDoS effects on system availability. Therefore, we evaluate the impact of the DDoS attacks on computing systems using IoT devices in attack amplification. We assessed equations that estimate the attack feasibility, pain factor, attack propensity, attacker benefits, and technical ability. They enable a direct analytical solution for large systems. The attack tree indices show the impact of simultaneous attacks on a computer system and the several threats that will maximize the system downtime. The attack tree investigation results allow for planning and improving the system’s availability, maintainability, and reliability.","PeriodicalId":384949,"journal":{"name":"2021 IEEE International Systems Conference (SysCon)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Systems Conference (SysCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SysCon48628.2021.9447145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Distributed Denial-of-Service (DDoS) attacks can occur anytime, everywhere, and most normally occur with little or no warning. Most small and medium businesses (SMBs) usually are not prepared to deal with this type of attack. The companies must have at least a bandwidth higher than the attack, an infrastructure with redundant components, regular backups, and firewalls capable of monitoring the threats. Otherwise, the services provided by the companies’ support can be interrupted, increasing the chances of financial losses. Hierarchical modeling approaches are often used to evaluate the availability of such systems. It can represent different failures and repair events in distinct parts of the system. In this way, this paper proposes hierarchical models that describe the behavior of major IT systems and IoT device components and assess the DDoS effects on system availability. Therefore, we evaluate the impact of the DDoS attacks on computing systems using IoT devices in attack amplification. We assessed equations that estimate the attack feasibility, pain factor, attack propensity, attacker benefits, and technical ability. They enable a direct analytical solution for large systems. The attack tree indices show the impact of simultaneous attacks on a computer system and the several threats that will maximize the system downtime. The attack tree investigation results allow for planning and improving the system’s availability, maintainability, and reliability.
基于物联网设备的DDoS攻击影响评估
分布式拒绝服务(DDoS)攻击可以在任何时间、任何地点发生,而且大多数攻击发生时几乎没有警告。大多数中小型企业(smb)通常没有准备好应对这种类型的攻击。公司必须拥有至少高于攻击的带宽,具有冗余组件的基础设施,定期备份和能够监控威胁的防火墙。否则,这些公司提供的支持服务可能会中断,增加经济损失的可能性。层次建模方法通常用于评估这类系统的可用性。它可以表示系统不同部分的不同故障和修复事件。通过这种方式,本文提出了描述主要IT系统和物联网设备组件行为的分层模型,并评估DDoS对系统可用性的影响。因此,我们在攻击放大中评估DDoS攻击对使用物联网设备的计算系统的影响。我们评估了评估攻击可行性、痛苦因素、攻击倾向、攻击者利益和技术能力的方程。它们为大型系统提供了直接的分析解决方案。攻击树指数显示了对计算机系统的同时攻击的影响以及将最大限度地延长系统停机时间的几种威胁。攻击树调查结果允许规划和改进系统的可用性、可维护性和可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信