一种物联网僵尸网络早期检测框架

Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani
{"title":"一种物联网僵尸网络早期检测框架","authors":"Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani","doi":"10.1109/ACIT57182.2022.9994166","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is an overgrowing technology in both consumer and business use. This technology can significantly affect people's daily lives by changing how people drink coffee and how smart things interact with different industries. IoT could be useful in a lot of different ways. It can give businesses more information about their business, which can help them become more efficient and save money. The sheer amount of data that is created, the size and variety of networks, and the security and privacy issues that come up all slow down development and implementation. In the past few decades, distributed denial-of-service (DDoS) attacks on Internet of Things (IoT) networks have been seen as one of the most critical and urgent problems. DDoS attacks use the limited resources of IoT devices, like storage space and network bandwidth, to cause problems in IoT applications. This study looks at the different attacks that can lead to DDoS, hurting systems already in place. In this paper, we examine the potential countermeasures to these types of attacks from the perspective of a restricted device.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Proposed Framework for Early Detection IoT Botnet\",\"authors\":\"Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani\",\"doi\":\"10.1109/ACIT57182.2022.9994166\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is an overgrowing technology in both consumer and business use. This technology can significantly affect people's daily lives by changing how people drink coffee and how smart things interact with different industries. IoT could be useful in a lot of different ways. It can give businesses more information about their business, which can help them become more efficient and save money. The sheer amount of data that is created, the size and variety of networks, and the security and privacy issues that come up all slow down development and implementation. In the past few decades, distributed denial-of-service (DDoS) attacks on Internet of Things (IoT) networks have been seen as one of the most critical and urgent problems. DDoS attacks use the limited resources of IoT devices, like storage space and network bandwidth, to cause problems in IoT applications. This study looks at the different attacks that can lead to DDoS, hurting systems already in place. In this paper, we examine the potential countermeasures to these types of attacks from the perspective of a restricted device.\",\"PeriodicalId\":256713,\"journal\":{\"name\":\"2022 International Arab Conference on Information Technology (ACIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Arab Conference on Information Technology (ACIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACIT57182.2022.9994166\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Arab Conference on Information Technology (ACIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIT57182.2022.9994166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)在消费者和商业应用中都是一种过度增长的技术。这项技术可以通过改变人们喝咖啡的方式以及智能事物与不同行业的互动方式来显著影响人们的日常生活。物联网可以在很多不同的方面发挥作用。它可以为企业提供更多有关其业务的信息,这可以帮助他们提高效率并节省资金。所创建的数据量、网络的规模和种类,以及随之而来的安全和隐私问题,都减慢了开发和实施的速度。在过去的几十年里,物联网(IoT)网络上的分布式拒绝服务(DDoS)攻击已被视为最关键和最紧迫的问题之一。DDoS攻击利用物联网设备有限的资源,如存储空间和网络带宽,在物联网应用中造成问题。本研究着眼于可能导致DDoS攻击的不同攻击,这些攻击会损害已经存在的系统。在本文中,我们从受限设备的角度研究了这些类型攻击的潜在对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Proposed Framework for Early Detection IoT Botnet
The Internet of Things (IoT) is an overgrowing technology in both consumer and business use. This technology can significantly affect people's daily lives by changing how people drink coffee and how smart things interact with different industries. IoT could be useful in a lot of different ways. It can give businesses more information about their business, which can help them become more efficient and save money. The sheer amount of data that is created, the size and variety of networks, and the security and privacy issues that come up all slow down development and implementation. In the past few decades, distributed denial-of-service (DDoS) attacks on Internet of Things (IoT) networks have been seen as one of the most critical and urgent problems. DDoS attacks use the limited resources of IoT devices, like storage space and network bandwidth, to cause problems in IoT applications. This study looks at the different attacks that can lead to DDoS, hurting systems already in place. In this paper, we examine the potential countermeasures to these types of attacks from the perspective of a restricted device.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信