Cargando…

A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios

The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday...

Descripción completa

Detalles Bibliográficos
Autores principales: Dantas Silva, Felipe S., Silva, Esau, Neto, Emidio P., Lemos, Marcilio, Venancio Neto, Augusto J., Esposito, Flavio
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7309081/
https://www.ncbi.nlm.nih.gov/pubmed/32485943
http://dx.doi.org/10.3390/s20113078
_version_ 1783549141831385088
author Dantas Silva, Felipe S.
Silva, Esau
Neto, Emidio P.
Lemos, Marcilio
Venancio Neto, Augusto J.
Esposito, Flavio
author_facet Dantas Silva, Felipe S.
Silva, Esau
Neto, Emidio P.
Lemos, Marcilio
Venancio Neto, Augusto J.
Esposito, Flavio
author_sort Dantas Silva, Felipe S.
collection PubMed
description The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing.
format Online
Article
Text
id pubmed-7309081
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-73090812020-06-25 A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios Dantas Silva, Felipe S. Silva, Esau Neto, Emidio P. Lemos, Marcilio Venancio Neto, Augusto J. Esposito, Flavio Sensors (Basel) Review The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing. MDPI 2020-05-29 /pmc/articles/PMC7309081/ /pubmed/32485943 http://dx.doi.org/10.3390/s20113078 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Dantas Silva, Felipe S.
Silva, Esau
Neto, Emidio P.
Lemos, Marcilio
Venancio Neto, Augusto J.
Esposito, Flavio
A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
title A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
title_full A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
title_fullStr A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
title_full_unstemmed A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
title_short A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
title_sort taxonomy of ddos attack mitigation approaches featured by sdn technologies in iot scenarios
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7309081/
https://www.ncbi.nlm.nih.gov/pubmed/32485943
http://dx.doi.org/10.3390/s20113078
work_keys_str_mv AT dantassilvafelipes ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT silvaesau ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT netoemidiop ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT lemosmarcilio ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT venancionetoaugustoj ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT espositoflavio ataxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT dantassilvafelipes taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT silvaesau taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT netoemidiop taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT lemosmarcilio taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT venancionetoaugustoj taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios
AT espositoflavio taxonomyofddosattackmitigationapproachesfeaturedbysdntechnologiesiniotscenarios