Cargando…

Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques

This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibl...

Descripción completa

Detalles Bibliográficos
Autores principales: Gayathri, Rajakumaran, Usharani, Shola, Mahdal, Miroslav, Vezhavendhan, Rajasekharan, Vincent, Rajiv, Rajesh, Murugesan, Elangovan, Muniyandy
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9921719/
https://www.ncbi.nlm.nih.gov/pubmed/36772751
http://dx.doi.org/10.3390/s23031708
_version_ 1784887379173048320
author Gayathri, Rajakumaran
Usharani, Shola
Mahdal, Miroslav
Vezhavendhan, Rajasekharan
Vincent, Rajiv
Rajesh, Murugesan
Elangovan, Muniyandy
author_facet Gayathri, Rajakumaran
Usharani, Shola
Mahdal, Miroslav
Vezhavendhan, Rajasekharan
Vincent, Rajiv
Rajesh, Murugesan
Elangovan, Muniyandy
author_sort Gayathri, Rajakumaran
collection PubMed
description This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface. The effectiveness of the proposed framework is validated through experimental simulations on the Amazon Web Service (AWS) platform, which shows a significant reduction in attack probabilities and delays. The integration of IoT and cloud technologies is a powerful combination that can deliver customized and critical solutions to major business vendors. However, ensuring the confidentiality and security of data among IoT devices, storage, and access to the cloud is crucial to maintaining trust among internet users. This paper demonstrates the importance of implementing robust security measures to protect IoT devices in the cloud environment and highlights the potential of the proposed solution in protecting against DDoS and false data injection attacks.
format Online
Article
Text
id pubmed-9921719
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-99217192023-02-12 Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques Gayathri, Rajakumaran Usharani, Shola Mahdal, Miroslav Vezhavendhan, Rajasekharan Vincent, Rajiv Rajesh, Murugesan Elangovan, Muniyandy Sensors (Basel) Article This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surface. The effectiveness of the proposed framework is validated through experimental simulations on the Amazon Web Service (AWS) platform, which shows a significant reduction in attack probabilities and delays. The integration of IoT and cloud technologies is a powerful combination that can deliver customized and critical solutions to major business vendors. However, ensuring the confidentiality and security of data among IoT devices, storage, and access to the cloud is crucial to maintaining trust among internet users. This paper demonstrates the importance of implementing robust security measures to protect IoT devices in the cloud environment and highlights the potential of the proposed solution in protecting against DDoS and false data injection attacks. MDPI 2023-02-03 /pmc/articles/PMC9921719/ /pubmed/36772751 http://dx.doi.org/10.3390/s23031708 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Gayathri, Rajakumaran
Usharani, Shola
Mahdal, Miroslav
Vezhavendhan, Rajasekharan
Vincent, Rajiv
Rajesh, Murugesan
Elangovan, Muniyandy
Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
title Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
title_full Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
title_fullStr Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
title_full_unstemmed Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
title_short Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
title_sort detection and mitigation of iot-based attacks using snmp and moving target defense techniques
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9921719/
https://www.ncbi.nlm.nih.gov/pubmed/36772751
http://dx.doi.org/10.3390/s23031708
work_keys_str_mv AT gayathrirajakumaran detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques
AT usharanishola detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques
AT mahdalmiroslav detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques
AT vezhavendhanrajasekharan detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques
AT vincentrajiv detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques
AT rajeshmurugesan detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques
AT elangovanmuniyandy detectionandmitigationofiotbasedattacksusingsnmpandmovingtargetdefensetechniques