Abstract
Now a day, Internet of Things (IoT) has touched almost every corner of human and unimaginably affect our life by its applications. Resources and environment are being more susceptible to security threats like Virus, DoS/DDoS, Ransomware, Spyware, IP Spoofing, etc. To consider security services and IoT devices capabilities, low power and processing constraints, response rate, this paper has proposed a Decision Tree-Based IDS for IoT environment to prevent intra and inter network from DoS/DDoS attacks. In this paper, the analysis is done in two ways- (a) Power consumption and (b) Attack Detection. The experiments are conducted in the Cooja simulator pre-installed in Contiki operating system within the virtual machine. From attack detection mode it is concluded that C5 Decision Tree-Based IDS model shows high accuracy with low false alarm rate (FAR). Whereas, from power consumption mode it is observed that the simulated network suffers from high-power consumption and around three times more CPU power and two-time Listening Power consumption during attack as compare to their normal behavior.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)
Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of MANET and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558–3567 (2013)
The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet. https://www.csoonline.com/article/3258748/security/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html
Loulianou, P., Vasilakis, V., Moscholios, I., Logothetis, M.: A signature-based intrusion detection system for the internet of things. In: Information and Communication Technology Form (2018)
Shreenivas, D., Raza, S., Voigt, T.: Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 31–38. ACM, April 2017
Moustafa, N., Slay, J.: The evaluation of Network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. A Glob. Perspect. 25(1–3), 18–31 (2016)
Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: Towards developing network forensic mechanism for Botnet Activities in the IoT based on machine learning techniques. In: International Conference on Mobile Networks and Management, pp. 30–44. Springer, Cham (2017)
Papamartzivanos, D., Mármol, F.G., Kambourakis, G.: Dendron: genetic trees driven rule induction for network intrusion detection systems. Future Gener. Comput. Syst. 79, 558–574 (2018)
Eastman, D., Kumar, S.A.: A simulation study to detect attacks on internet of things. In: 2017 IEEE 15th International Dependable, Autonomic and Secure Computing, 15th International Conference on Pervasive Intelligence & Computing, 3rd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 645–650. IEEE, November 2017
Cooja Simulator – Contiki. https://anrg.usc.edu/contiki/index.php/Cooja_Simulator
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference, pp. 1–6 (2015)
KDD 99 data set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Diaz, A., Sanchez, P.: Simulation of attacks for security in wireless sensor network. Sensors 16(11) (2016)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Mehare, T.M., Bhosale, S.: Design and development of intrusion detection system for internet of things. Int. J. Innovative Res. Comput. Commun. Eng. 5(7), 13469–13475 (2017)
Kumar, V., Das, K.A., Sinha, D.: Statistical analysis of the UNSW-NB15 dataset for intrusion detection. In: 1st International Conference on Computational Intelligence in Pattern Recognition. Springer (2019, in press)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kumar, V., Kumar, V., Sinha, D., Das, A.K. (2020). Simulation Analysis of DDoS Attack in IoT Environment. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-39875-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39874-3
Online ISBN: 978-3-030-39875-0
eBook Packages: EngineeringEngineering (R0)