Cargando…
A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7309081/ https://www.ncbi.nlm.nih.gov/pubmed/32485943 http://dx.doi.org/10.3390/s20113078 |
_version_ | 1783549141831385088 |
---|---|
author | Dantas Silva, Felipe S. Silva, Esau Neto, Emidio P. Lemos, Marcilio Venancio Neto, Augusto J. Esposito, Flavio |
author_facet | Dantas Silva, Felipe S. Silva, Esau Neto, Emidio P. Lemos, Marcilio Venancio Neto, Augusto J. Esposito, Flavio |
author_sort | Dantas Silva, Felipe S. |
collection | PubMed |
description | The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing. |
format | Online Article Text |
id | pubmed-7309081 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-73090812020-06-25 A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios Dantas Silva, Felipe S. Silva, Esau Neto, Emidio P. Lemos, Marcilio Venancio Neto, Augusto J. Esposito, Flavio Sensors (Basel) Review The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing. MDPI 2020-05-29 /pmc/articles/PMC7309081/ /pubmed/32485943 http://dx.doi.org/10.3390/s20113078 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Dantas Silva, Felipe S. Silva, Esau Neto, Emidio P. Lemos, Marcilio Venancio Neto, Augusto J. Esposito, Flavio A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios |
title | A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios |
title_full | A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios |
title_fullStr | A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios |
title_full_unstemmed | A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios |
title_short | A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios |
title_sort | taxonomy of ddos attack mitigation approaches featured by sdn technologies in iot scenarios |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7309081/ https://www.ncbi.nlm.nih.gov/pubmed/32485943 http://dx.doi.org/10.3390/s20113078 |
work_keys_str_mv | AT dantassilvafelipes ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT silvaesau ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT netoemidiop ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT lemosmarcilio ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT venancionetoaugustoj ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT espositoflavio ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT dantassilvafelipes taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT silvaesau taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT netoemidiop taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT lemosmarcilio taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT venancionetoaugustoj taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios AT espositoflavio taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios |