A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
Abstract
:1. Introduction
The Key Contributions
- (1)
- This is the first comprehensive examination of 13 IoT vulnerability detection systems (in detail, their general information, workings, and techniques), with 11 of them focusing primarily on DDoS attacks.
- (2)
- In the light of the current emphasis on the blockchain, we categorize IoT-based vulnerability detection systems into blockchain-based categories.
- (3)
- Through our discussion of DDoS attacks based on the bitcoin blockchain, Ethereum SCs, power systems, and UDP protocol, we extend our coverage beyond IoT-based DDoS attacks.
- (4)
- We briefly outline the three-layer and five-layer architectures for IoT networks.
- (5)
- We provide future directions for the advancement of research and the problems hindering the IoT and IoT subsystems in handling DDoS attacks.
Survey Section | Significance | The Focus of Research Papers |
---|---|---|
Motivation | Survey | – DDoS Mitigation Techniques [6] |
(Section 2) | – Detection of DDoS Attack [7] | |
– Blockchain-based Solutions [3] | ||
Background Knowledge | Blockchain | – Secure Blockchain Model for Botnet Detection [8] |
(Section 4) | IPFS | – IoT Data Streaming Using Blockchain and IPFS [9] |
– Data Security: IoT, Blockchain and IPFS [10] | ||
Machine Learning | – DDoS Attack Prediction [11] | |
DDoS Power Grids | – Modeling Impact of DDoS Attack [12] | |
Detection Techniques | Blockchain-based | – DDoS Detection for Blockchain Network Layer [13] |
(Section 7) | Collaborative Blockchain | – SDN Targeted DDoS [14] |
Non-Blockchain-based | – Random Forest and Mutual Information-based DDoS Detection [15] |
2. Motivation
Comparison of Our Survey with State-of-the-Art Surveys
- (a)
- (b)
- On the other hand, our research focuses on all techniques related to DDoS attacks, including Machine-Learning and other methods such as security policies and traffic rates.
- (c)
- Another distinguishing factor is that our research discusses DDoS attacks on the IoT and different IoT subsystems such as the blockchain, SCs, SDN, power grids, and networking protocols such as UDP.
- (d)
- Table 2 compares state-of-the-art surveys, including ours, in the context of the focus of the surveys, the survey methodologies, and the DDoS attacks on IoT subsystems discussed in the survey paper. Thus, our research provides greater potential for learning and advancement of knowledge for both students and researchers.
3. Materials and Methodology
Exclusion and Inclusion Policy
- Exclusion Policy: Our default exclusion policy is to avoid papers unrelated to IoT DDoS, IoT firmware, and IoT physical attacks.
- Inclusion Policy: We allowed papers related to DDoS and the IoT, DDoS and blockchain, DDoS and SC, DDoS and power grids, and DDoS and UDP.
4. Theoretical Foundations or Background Knowledge
4.1. Blockchain
4.1.1. Advantages of Blockchain for IoT Networks
- (1)
- The blockchain performs device authentication. Thus, the blockchain prevents illegal access to IoT data.
- (2)
- The blockchain records transactions and SCs can perform processing; hence, the merger of the two can perform both storage and processing at no additional cost.
- (3)
- The blockchain has several nodes for validation purposes called miners. Thus, tracking anomalies such as the unprecedented volume of data flow from IoT devices and timing is more comprehensive than other platforms.
4.1.2. DDoS Attacks in the Bitcoin Blockchain
4.2. Smart Contracts (SCs)
4.2.1. DDoS Attacks on SCs
4.3. DDoS Attacks on Power Grid Systems
4.4. UDP
4.4.1. DDoS Attack Due to UDP
4.5. Comparison of DDoS Attacks on IoT Sub-Systems and Mirai, Section (Section 4.6.1)
Attack Name | Impact | Recent Instance | Built-In Stopping Mechanism |
---|---|---|---|
SC DDoS | Exceeded SC’s gas ceiling | 2016 [32] | gas fee |
Bitcoin blockchain DDoS | Flooding of transactions | 2017 [29] | transaction fee |
UDP DDoS | Exhausted resources of targeted server | 2022 [47] | nill |
Power Grids DDoS | Lack of power to huge population | 2015 [48] | nill |
Mirai | Shutdown of several important websites | 2016 [17] | n/a |
4.6. Recent Trends in DDoS Attacks
4.6.1. Mirai DDoS Attack
- (i)
- A command and control module that allows a human to control the bots;
- (ii)
- The Mirai bot runs on infected IoT devices and consists of three modules: (a) a scanner, which scans new vulnerable IoT devices and informs the reporting server; (b) the killer, which kills other malware competing with Mirai; and (c) the attacker, allowing the bot to hack other IoT devices when the command and control center orders it;
- (iii)
- The reporting server interacts with the Mirai botnet to obtain information about the vulnerable IoT devices and passes it to the load server.
- (iv)
- The loader server replaces vulnerable IoT devices’ codes with the Mirai malware’s codes, thus inducting vulnerable IoT devices into the botnet.
4.7. IPFS
4.8. Software-Defined Networking (SDN)
- (i)
- The data plane deals with data packets and performs actions on them. Thus, the data plane works with line-speed [57] and interacts with the control plane through tables to obtain the required information.
- (ii)
- The control plane provides the required information to the data plane so that the data plane can process and forward the data packets. For this purpose, the control plane creates tables such as the IP routing table and then adds, removes, and changes the table’s entries, representing the routes to network destinations.
- (iii)
- The management plane is responsible for configuring and monitoring network devices such as switches and routers.
4.9. Field-Programmable Gate Array (FPGA)
4.10. Machine-Learning Performance Metrics
4.10.1. Precision
4.10.2. Recall
4.10.3. F1 Score
4.11. Machine-Learning Algorithms
4.11.1. Random Forest
4.11.2. XGBoost
4.11.3. K-Nearest Neighbor
5. A Glimpse of IoT Architecture
5.1. Three-Layer Architecture
5.1.1. Perception Layer
5.1.2. Network Layer
5.1.3. Application Layer
5.2. Five-Layer Architecture
5.2.1. Business Layer
5.2.2. Middle Layer
6. Brief Description of IoT Vulnerability Detection Systems
6.1. IoTCop
6.1.1. General Information
6.1.2. Working
6.2. Lightweight Collaborative Blockchain-Based Model
6.2.1. General Information
6.2.2. Working
6.3. IoT Agent and SC-Based DDoS Detection System
6.3.1. General Information
6.3.2. Working
6.4. A Hybrid Deep-Learning-Based Mechanism for a Smart Transport System
6.4.1. General Information
6.4.2. Working
6.5. DDoS Detection by XGBoost, and Random Forest, in an SC-Based Blockchain–IoT System
6.5.1. General Information
6.5.2. Working
6.6. Distributed Intrusion Detection System (IDS) to Detect DDoS Attacks in Blockchain–IoT Network
6.6.1. General Information
6.6.2. Working
6.7. Grammar-Based Filtering and Clustering Algorithm for DDoS Detection
6.7.1. General Information
6.7.2. Working
6.8. DDoS Detection Using Machine-Learning and SMOTE-Based Techniques (SMOTE)
6.8.1. General Information
6.8.2. Working
6.9. Machine-Learning-Based Smart Detection System
6.9.1. General Information
6.9.2. Working
6.10. IoT-Based Monitoring System for Banking Sector
6.10.1. General Information
6.10.2. Working
6.11. A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection System
6.11.1. General Information
6.11.2. Working
6.12. NetSprint
6.12.1. General Information
6.12.2. Working
6.13. Blockchain-Based Botnet Detection
6.13.1. General Information
6.13.2. Working
Approach Type | Vulnerability/Attack | Detection System | Technique |
---|---|---|---|
Blockchain-based Collaboration | DDoS | Blockchain-based Detection and Collaborative Mitigation System [97], (Section 6.13 and Section 7.13) | Policy Violation |
Collaborative Blockchain-based System [78], (Section 6.3 and Section 7.3) | If the ratio of the outgoing messages from the busiest node to the second most active node of the system is greater than 2, then the busiest node is a DDoS victim | ||
Deep Blockchain-based Collaborative Intrusion Detection System [93], (Section 6.11 and Section 7.11) | Uses Intrusion Detection Systems trained with bi-directional long short-term memory-based Recurrent Neural Network | ||
Buffer Overflow, Code Reuse, Replay Attack | Lightweight Collaborative Blockchain-based Anomaly Detection System [77], (Section 6.2 and Section 7.2) | Agent identifies the memory region causing failure and passes the information to the user | |
Blockchain-based Non-Collaborative Systems | Firmware Attack | IoTCop [76], (Section 6.1 and Section 7.1) | Monitors inter-message communication between devices and isolates a device not complying with security policy |
DDoS | Framework for Detecting DDoS in an SC-based Blockchain–IoT System [82], (Section 6.5 and Section 7.5) | Use of AI techniques in Intrusion Detection System to distinguish network traffic as benign or hacker-based | |
AI-enabled System to detect DDoS in Blockchain-based Smart Transport System [79], (Section 6.4 and Section 7.4) | Combines autoencoder with Multi-Layer Perceptron to detect DDoS | ||
Distributed Intrusion Detection System for Blockchain-enabled IoT Network [84], (Section 6.6 and Section 7.6) | Integration of Detection System with the Mining pool and use of AI techniques | ||
Non-Blockchain-based Systems | DDoS | NetSprint [94], (Section 6.12 and Section 7.12) | Collaborative Learning using semi-supervised learning and model pruning |
IoT-based monitoring System of Banking Sector using Machine-Learning [91], (Section 6.10 and Section 7.10) | Justifies SVM for DDoS detection | ||
Machine-Learning-based Smart Detection System [88], (Section 6.9 and Section 7.9) | Smart Detection System works well with Random Forest, XGBoost, and AdaBoost | ||
Grammar-based filtering and Clustering Algorithm [4], (Section 6.7 and Section 7.7) | Detection of suspicious packets and increase in arrival rate | ||
Machine-Learning-based botnet Detection System [87], (Section 6.8 and Section 7.8) | Combined feature Engineering, SMOTE Technology, and Machine-Learning Algorithms |
7. Firmware, Physical, and DDoS Attack Detection Techniques
7.1. Detection Technique Using Security Policy in IoTCop
7.2. Detection Technique Using Control Flow Monitoring in Light-Weight Blockchain-Based Collaborative Model
7.3. Detection Technique Using IoT Agent and SC-Based Collaborative Model
7.4. Detection Technique Using Hybrid Deep-Learning-Based Mechanism for Smart Transport System
7.5. Detection Technique Using XGBoost and Random Forest in an SC-Based IoT–Blockchain System
7.6. Detection Technique Using Distributed Intrusion Detection System (IDS) to Detect DDoS Attacks in a Blockchain–IoT Network
7.7. Detection Technique Using Grammar-Based Filtering and Clustering Algorithm
7.8. DDoS Detection via Botnet Detection Using Machine-Learning in an IoT System
7.9. DDoS Detection Using a Machine-Learning-Based Smart Detection System
7.10. DDoS Detection Using IoT-Based Monitoring System for the Banking Sector
7.11. DDoS Detection Using a Deep Blockchain Framework-Enabled Collaborative Intrusion Detection System
7.12. DDoS Detection by NetSprint
7.13. DDoS Detection using Blockchain-Based Detection and a Collaborative Mitigation System
8. Future Work and Challenges
8.1. Challenges and Open Issues
8.1.1. Multi-Way Authentication of IoT Devices
8.1.2. Lack of Built-In Mechanism to Stop DDoS
8.1.3. Blockchain: Storing Large Files
8.2. Future Work and Suggestions
8.2.1. DDoS Detection and Mitigation: Packet Rate and Rebooting
8.2.2. Blockchain: Adoption for Retail
8.2.3. Comparison of Machine-Learning Algorithms
8.2.4. Federated Learning
8.2.5. Collaborative Differential Learning
8.2.6. DDoS Detection and Mitigation: The IoT-FPGA Approach
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Smith, G.M. Data Acquisition (DAQ)—The Ultimate Guide. Available online: https://dewesoft.com/daq/what-is-data-acquisition (accessed on 1 November 2022).
- Thouti, S.; Venu, N.; Rinku, D.R.; Arora, A.; Rajeswaran, N. Investigation on identify the multiple issues in IoT devices using Convolutional Neural Network. Meas. Sens. 2022, 24, 100509. [Google Scholar] [CrossRef]
- Shah, Z.; Ullah, I.; Li, H.; Levula, A.; Khurshid, K. Blockchain-Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors 2022, 22, 1094. [Google Scholar] [CrossRef]
- Ekolle, Z.E.; Kimio, K.; Ryuji, K. Intelligent Security Monitoring in Time Series of DDoS attack on IoT Networks using Grammar base Filtering and Clustering. In Proceedings of the 2018 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Ishigaki Island, Japan, 27–30 November 2018; pp. 37–42. [Google Scholar]
- DoS vs. DDoS. Available online: https://www.fortinet.com/resources/cyberglossary/dos-vs-ddos# (accessed on 19 August 2022).
- Rajan, D.M.; Sathya Priya, S. DDoS mitigation techniques in IoT: A Survey. In Proceedings of the 2022 International Conference on IoT and Blockchain Technology (ICIBT), Ranchi, India, 6–8 May 2022; pp. 1–7. [Google Scholar]
- Jing, H.; Wang, J.; Chen, C.L. Detection of DDoS Attack within Industrial IoT Devices Based on Clustering and Graph Structure Features. Sec. Commun. Netw. 2022, 2022, 1401683. [Google Scholar] [CrossRef]
- Salim, M.M.; Comivi, A.K.; Nurbek, T.; Park, H.; Park, J.H. A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment. Sensors 2022, 22, 6133. [Google Scholar] [CrossRef] [PubMed]
- Hasan, H.R.; Salah, K.; Yaqoob, I.; Jayaraman, R.; Pesic, S.; Omar, M. Trustworthy IoT Data Streaming Using Blockchain and IPFS. IEEE Access 2022, 10, 17707–17721. [Google Scholar] [CrossRef]
- Azbeg, K.; Ouchetto, O.; Jai Andaloussi, S. BlockMedCare: A healthcare system based on IoT, Blockchain, and IPFS for data management security. Egypt. Inform. J. 2022, 23, 329–343. [Google Scholar] [CrossRef]
- Liu, Z.; Qian, L.; Tang, S. The prediction of DDoS attack by Machine-Learning. In Proceedings of the Third International Conference on Electronics and Communication, Harbin, China, 7 March 2022; p. 6. [Google Scholar]
- Acarali, D.; Rajesh Rao, K.; Rajarajan, M.; Chema, D.; Ginzburg, M. Modelling smart grid IT-OT dependencies for DDoS impact propagation. Comput. Secur. 2022, 112, 102528. [Google Scholar] [CrossRef]
- Dai, Q.Y.; Zhang, B.; Dong, S.Q.; Fu, A. A DDoS-Attack Detection Method Oriented to the Blockchain Network Layer. Sec. Commun. Netw. 2022, 2022, 5692820. [Google Scholar] [CrossRef]
- Jiang, S.; Yang, L.; Gao, X.; Zhou, Y.; Feng, T.; Song, Y.; Liu, K.; Cheng, G.; Chen, Y. BSD-Guard: A Collaborative Blockchain-Based Approach for Detection and Mitigation of SDN-Targeted DDoS Attacks. Sec. Commun. Netw. 2022, 2022, 1608689. [Google Scholar] [CrossRef]
- Alduailij, M.; Khan, Q.W.; Tahir, M.; Sardaraz, M.; Alduailij, M.; Malik, F. Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method. Symmetry 2022, 14, 1095. [Google Scholar] [CrossRef]
- Babu, M.R.; Veena, K.N. A Survey on Attack Detection Methods For IOT Using Machine Learning And Deep Learning. In Proceedings of the 2021 3rd International Conference on Signal Processing and Communication (ICPSC), Coimbatore, India, 13–14 May 2021; pp. 625–630. [Google Scholar]
- Wazzan, M.; Algazzawi, D.; Bamasaq, O.; Albeshri, A.; Cheng, L. Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research. Appl. Sci. 2021, 11, 5713. [Google Scholar] [CrossRef]
- Mittal, M.; Kumar, K.; Behal, S. Deep learning approaches for detecting DDoS attacks: A systematic review. Soft Comput. 2022. [Google Scholar] [CrossRef] [PubMed]
- Chaganti, R.; Bhushan, B.; Ravi, V. The role of Blockchain in DDoS attacks mitigation: Techniques, open challenges and future directions. arXiv 2022, arXiv:2202.03617. [Google Scholar]
- Dalmazo, B.L.; Marques, J.A.; Costa, L.R.; Bonfim, M.S.; Carvalho, R.N.; da Silva, A.S.; Fernandes, S.; Bordim, J.L.; Alchieri, E.; Schaeffer-Filho, A.; et al. A systematic review on distributed denial of service attack defense mechanisms in programmable networks. Int. J. Netw. Manag. 2021, 31, e2163. [Google Scholar] [CrossRef]
- Alashhab, A.A.; Zahid, M.S.M.; Azim, M.A.; Daha, M.Y.; Isyaku, B.; Ali, S. A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry 2022, 14, 1563. [Google Scholar] [CrossRef]
- Eswari, D.S. A Survey On Detection Of DDos Attacks Using Machine Learning Approaches. Turk. J. Comput. Math. Educ. 2021, 12, 4923–4931. [Google Scholar]
- Ashraf, A.; Elmedany, W.M. IoT DDoS attacks detection using machine learning techniques: A Review. In Proceedings of the 2021 International Conference on Data Analytics for Business and Industry (ICDABI), Sakheer, Bahrain, 25–26 October 2021; pp. 178–185. [Google Scholar]
- Cheema, A.; Tariq, M.; Hafiz, A.; Khan, M.M.; Ahmad, F.; Anwar, M. Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review. Secur. Commun. Netw. 2022, 2022, 8379532. [Google Scholar] [CrossRef]
- Khan, Z.A.; Namin, A.S. The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: A Survey. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 2421–2426. [Google Scholar]
- Khan, Z.A.; Siami Namin, A. Ethereum Smart Contracts: Vulnerabilities and their Classifications. In Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020; pp. 1–10. [Google Scholar]
- Yadav-Ranjan, R.; Brisebois, A.; Banerjee, S. DDoS Attack Identification Utilizing Machine Learning in Circumstances Involving Hacked IoT Devices/Insider Assaults. Available online: https://www.iiconsortium.org/news-pdf/joi-articles/2022-March-JoI-DDoS-Attack-Identification-Using-Machine-Learning.pdf (accessed on 25 August 2022).
- Goodin, D. One of the Most Powerful DDoS Attacks Ever Hits a Crypto Platform. Available online: https://www.wired.com/story/ddos-attack-botnet-crypto-platform/# (accessed on 24 August 2022).
- Saad, M.; Njilla, L.; Kamhoua, C.; Kim, J.; Nyang, D.; Mohaisen, A. Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Republic of Korea, 14–17 May 2019; pp. 285–292. [Google Scholar]
- Tulic, A. Is It Possible to Launch a DDoS Attack Using Ethereum’s Blockchain? Available online: https://www.quora.com/Is-it-possible-to-launch-a-DDoS-attack-using-Ethereums-blockchain (accessed on 31 August 2022).
- How the Ethereum Network Handle Ddos Attacks? Available online: https://www.reddit.com/r/ethereum/comments/2iyyk9/how_the_ethereum_network_handle_ddos_attacks/ (accessed on 2 September 2022).
- Ethereum Network Attacker’s IP Address Is Traceable. Available online: https://www.bokconsulting.com.au/blog/ethereum-network-attackers-ip-address-is-traceable/ (accessed on 26 August 2022).
- Why Is My Node Synchronization Stuck/Extremely Slow at Block 2,306,843? Available online: https://ethereum.stackexchange.com/questions/9883/why-is-my-node-synchronization-stuck-extremely-slow-at-block-2-306-843/9892#9892 (accessed on 26 August 2022).
- Yang, T.; Liu, Y.; Li, W. Attack and defence methods in cyber-physical power system. IET Energy Syst. Integr. 2022, 4, 159–170. [Google Scholar] [CrossRef]
- Krause, T.; Ernst, R.; Klaer, B.; Hacker, I.; Henze, M. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 2021, 21, 6225. [Google Scholar] [CrossRef]
- Hu, L.; Wang, Z.; Han, Q.; Liu, X. State estimation under false data injection attacks: Security analysis and system protection. Automatica 2018, 87, 176–183. [Google Scholar] [CrossRef] [Green Version]
- Merlino, J.; Asiri, M.; Saxena, N. DDoS Cyber-Incident Detection in Smart Grids. Sustainability 2022, 14, 2730. [Google Scholar] [CrossRef]
- Maupin, R.Z. What Are Unusual Ports? Available online: https://networkengineering.stackexchange.com/questions/80151/what-are-unusual-ports (accessed on 18 October 2022).
- Wu, Y.; Weng, J.; Qiu, B.; Wei, Z.; Qian, F.; Deng, R.H. Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. In Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC), Hangzhou, China, 18–20 November 2019; pp. 1–8. [Google Scholar] [CrossRef]
- Yan, S.; Gu, Z.; Park, J.H.; Xie, X.; Dou, C. Probability-density-dependent load frequency control of power systems with random delays and cyber-attacks via circuital implementation. IEEE Trans. Smart Grid 2022, 13, 4837–4847. [Google Scholar] [CrossRef]
- Yan, S.; Nguang, S.K.; Zhang, L. Nonfragile Integral-Based Event-Triggered Control of Uncertain Cyber-Physical Systems under Cyber-Attacks. Complexity 2019, 2019, 8194606. [Google Scholar] [CrossRef]
- Dorato, P. Non-fragile controller design: An overview. In Proceedings of the 1998 American Control Conference. ACC (IEEE Cat. No. 98CH36207), Philadelphia, PA, USA, 26 June 1998; Volume 5, pp. 2829–2831. [Google Scholar]
- Seuret, A.; Gouaisbaut, F.; Ariba, Y. Complete quadratic Lyapunov functionals for distributed delay systems. Automatica 2015, 62, 168–176. [Google Scholar] [CrossRef] [Green Version]
- TCP or UDP—Which Protocol Does VoIP Use? Available online: https://www.vipvoip.co.uk/tcp-vs-udp/ (accessed on 28 October 2022).
- What Is a UDP Flood Attack? Available online: https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/ (accessed on 28 October 2022).
- Sarangam, A. UDP Flooder DDOS ATTACK—A Concise Guide For 2021. Available online: https://www.jigsawacademy.com/blogs/cyber-security/udp-flooder/ (accessed on 28 October 2022).
- Pal, D. UDP-Based Amplification—The Dangerous DDoS Attack Vector. Available online: https://blog.apnic.net/2022/08/19/udp-based-amplification-the-dangerous-ddos-attack-vector/2022 (accessed on 1 November 2022).
- Krigman, A. Cyber Autopsy Series: Ukrainian Power Grid Attack Makes History. Available online: https://www.globalsign.com/en/blog/cyber-autopsy-series-ukranian-power-grid-attack-makes-history (accessed on 1 November 2022).
- What is a Ransom DDoS attack? Available online: https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/ (accessed on 24 August 2022).
- What is Ransom DDoS (RDDoS)? Available online: https://www.imperva.com/learn/ddos/ransom-ddos-rddos/# (accessed on 24 August 2022).
- Jawad, A.; Newton, L.; Matrawy, A.; Jaskolka, J. A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 2206–2211. [Google Scholar]
- De Donno, M.; Dragoni, N.; Giaretta, A.; Spognardi, A.; Bugliesi, M. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Sec. Commun. Netw. 2018, 2018, 7178164. [Google Scholar] [CrossRef] [Green Version]
- What Is IPFS (InterPlanetary File System)? Available online: https://moralis.io/what-is-ipfs-interplanetary-file-system/ (accessed on 2 September 2022).
- What Is Software-Defined Networking (SDN)? Available online: https://www.vmware.com/topics/glossary/content/software-defined-networking.html (accessed on 1 November 2022).
- Odom, W. Introduction to Controller-Based Networking. Available online: https://www.ciscopress.com/articles/article.asp?p=2995354&seqNum=2 (accessed on 1 November 2022).
- Contini, A. Software Defined Networking Fundamentals Part 1: Intro to Networking Planes. Available online: https://www.opendaylight.org/blog/2016/11/16/software-defined-networking-fundamentals-part-1-intro-to-networking-planes (accessed on 1 November 2022).
- Szyrkowiec, T.; Santuari, M.; Chamania, M.; Siracusa, D.; Autenrieth, A.; Lopez, V.; Cho, J.; Kellerer, W. Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration. J. Opt. Commun. Netw. 2018, 289–297. [Google Scholar] [CrossRef]
- Magyari, A.; Chen, Y. Review of State-of-the-Art FPGA Applications in IoT Networks. Sensors 2022, 22, 7496. [Google Scholar] [CrossRef]
- Jumaa, N. Survey: Internet of Thing Using FPGA. Iraqi J. Electr. Electron. Eng. 2017, 13, 38–45. [Google Scholar] [CrossRef]
- Babaei, A.; Schiele, G.; Zohner, M. Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices. Sensors 2022, 22, 5577. [Google Scholar] [CrossRef]
- Machine Learning Terms: Problem with Understanding the Definition of Precision and Recall. Available online: https://www.reddit.com/r/learnmath/comments/wmnzxj/machine_learning_terms_problem_with_understanding/ (accessed on 19 August 2022).
- Brightlinger, A. Machine Learning: Can’t Understand F1 Score Is Harmonic Mean. Available online: https://www.reddit.com/r/learnmath/comments/wnqsw6/machine_learning_cant_understand_f1_score_is/ (accessed on 18 September 2022).
- XGBoost. Available online: https://www.nvidia.com/en-us/glossary/data-science/xgboost/ (accessed on 22 August 2022).
- Joby, A. What Is K-Nearest Neighbor? An ML Algorithm to Classify Data. Available online: https://learn.g2.com/k-nearest-neighbor (accessed on 22 August 2022).
- Doshi, K.; Yilmaz, Y.; Uludag, S. Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks. IEEE Trans. Dependable Secur. Comput. 2021, 18, 2164–2176. [Google Scholar] [CrossRef]
- Gupta, B.B.; Quamara, M. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr. Comput. Pract. Exp. 2020, 32, e4946. [Google Scholar] [CrossRef]
- Lombardi, M.; Pascale, F.; Santaniello, D. Internet of Things: A General Overview between Architectures, Protocols and Applications. Information 2021, 12, 1–20. [Google Scholar] [CrossRef]
- Rayes, A.; Salam, S. Internet of Things From Hype to Reality; Springer: Cham, Switzerland, 2017; pp. 93–138. [Google Scholar]
- IoT Protocols and Their Architecture. Available online: https://www.elprocus.com/iot-protocols-and-its-architectures/ (accessed on 26 August 2021).
- Liu, H.; Bolic, M.; Nayak, A.; Stojmenovi, I. Encyclopedia on Ad Hoc and Ubiquitous Computing; World Scientific Publishing Company: Singapore, 2009; pp. 319–347. [Google Scholar]
- Soh, Z.H.C.; Jaafar, A.K.H.A.; Sulaiman, S.N.; Abdullah, S.A.C.; Ibrahim, M.N.; Bakar, A.A. Fridge Load Management System with AI and IOT Alert; IOP Publishing: Philadelphia, PA, USA, 2021. [Google Scholar]
- Refrigerator, User Manual, SamSung 2021. Available online: https://www.manualslib.com/manual/147316/Samsung-Refrigerator.html (accessed on 19 November 2022).
- 6LoWPAN From Wikipedia, the Free Encyclopedia. Available online: https://en.wikipedia.org/wiki/6LoWPAN (accessed on 30 October 2021).
- Business Logic. Available online: https://en.wikipedia.org/wiki/Business_logic (accessed on 26 August 2021).
- Davis, E. Available online: https://www.practicalecommerce.com/How-Backend-Code-Describes-an-Ecommerce-Business (accessed on 26 August 2021).
- Seshadri, S.S.; Rodriguez, D.; Subedi, M.; Choo, K.K.R.; Ahmed, S.; Chen, Q.; Lee, J. IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems. IEEE Internet Things J. 2021, 8, 3346–3359. [Google Scholar] [CrossRef]
- Mirsky, Y.; Golomb, T.; Elovici, Y. Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distrib. Comput. 2020, 145, 75–97. [Google Scholar] [CrossRef]
- Spathoulas, G.; Giachoudis, N.; Damiris, G.P.; Theodoridis, G. Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 2019, 11, 226. [Google Scholar] [CrossRef] [Green Version]
- Liu, T.; Sabrina, F.; Jang-Jaccard, J.; Xu, W.; Wei, Y. Artificial Intelligence-Enabled DDoS Detection for Blockchain-Based Smart Transport Systems. Sensors 2021, 1, 32. [Google Scholar] [CrossRef] [PubMed]
- Saripuddin, M.; Suliman, A.; Syarmila Sameon, S.; Jorgensen, B.N. Random Undersampling on Imbalance Time Series Data for Anomaly Detection. In Proceedings of the 2021 The 4th International Conference on Machine Learning and Machine Intelligence. Association for Computing Machinery, MLMI’21, Hangzhou, China, 17–19 September 2021; pp. 151–156. [Google Scholar]
- Oliveira, T.P.; Barbar, J.S.; Soares, A.S. Multilayer Perceptron and Stacked Autoencoder for Internet Traffic Prediction. Network and Parallel Computing; Springer: Berlin/Heidelberg, Germany, 2014; pp. 61–71. [Google Scholar]
- Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R. A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Trans. Emerg. Telecommun. Technol. 2021, 32, e4112. [Google Scholar] [CrossRef]
- Triebstok, K. How IPFS is Challenging the Web as We Know It. Available online: https://medium.com/innovation/how-ipfs-is-disrupting-the-web-e10857397822# (accessed on 19 August 2022).
- Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Garg, S.; Hassan, M.M. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J. Parallel Distrib. Comput. 2022, 164, 55–68. [Google Scholar] [CrossRef]
- Gosavi, A. Tutorial for Use of Basic Queueing Formulas. Available online: https://web.mst.edu/~gosavia/queuing_formulas.pdf (accessed on 16 August 2022).
- Goodacre, N.; Aljanahi, A.; Nandakumar, S.; Mikailov, M.; Khan, A.S. A Reference Viral Database (RVDB) To Enhance Bioinformatics Analysis of High-Throughput Sequencing for Novel Virus Detection. mSphere 2018, 3, e00069-18. [Google Scholar] [CrossRef] [Green Version]
- Pokhrel, S.; Abbas, R.; Aryal, B. IoT Security: Botnet detection in IoT using Machine learning. arXiv 2021, arXiv:2104.02231. [Google Scholar]
- Peneti, S.E.H. DDOS Attack Identification using Machine Learning Techniques. In Proceedings of the 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 27–29 January 2021; pp. 1–5. [Google Scholar]
- Mwanthi, D. Getting Started with Recursive Feature Elimination Algorithm in Machine Learning. Available online: https://www.section.io/engineering-education/recursive-feature-elimination/ (accessed on 22 August 2022).
- scikit-learn: Machine Learning in Python. Available online: https://scikit-learn.org/stable/ (accessed on 22 August 2022).
- Islam, U.; Muhammad, A.; Mansoor, R.; Hossain, M.S.; Ahmad, I.; Eldin, E.T.; Khan, J.A.; Rehman, A.U.; Shafiq, M. Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models. Sustainability 2022, 14, 8374. [Google Scholar] [CrossRef]
- Onel Harrison. Machine Learning Basics with the K-Nearest Neighbors Algorithm. Available online: https://towardsdatascience.com/Machine-Learning-basics-with-the-k-nearest-neighbors-algorithm-6a6e71d01761 (accessed on 12 August 2022).
- Alkadi, O.; Moustafa, N.; Turnbull, B.; Choo, K.K.R. A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 2021, 8, 9463–9472. [Google Scholar] [CrossRef]
- Xu, K.; Zheng, Y.; Yao, S.; Wu, B.; Xu, X. NetSpirit: A Smart Collaborative Learning Framework for DDoS Attack Detection. IEEE Netw. 2021, 35, 140–147. [Google Scholar] [CrossRef]
- bok. Semi-Supervised Learning. Available online: https://en.wikipedia.org/wiki/Semi-supervised_learning (accessed on 29 August 2022).
- Pruning Overview. Available online: https://docs.xilinx.com/r/1.3-English/ug1333-ai-optimizer/Pruning-Overview (accessed on 1 November 2022).
- Muhammad Sajjad, S.; Rafiq, M.; Yousaf, M.; Aslam, W.; Alshahrani, R.; Nemri, N.; Afzal, H.; Khan, M.; Chen, C.M. Detection and Blockchain-Based Collaborative Mitigation of Internet of Things Botnets. Wirel. Commun. Mob. Comput. 2022, 2022, 1194899. [Google Scholar]
- Shacklett, M.E. Rootkit. Available online: https://www.techtarget.com/searchsecurity/definition/rootkit (accessed on 23 August 2022).
- Gadekallu, T.R.; Pham, Q.V.; Nguyen, D.C.; Maddikunta, P.K.R.; Deepa, N.; Prabadevi, B.; Pathirana, P.N.; Zhao, J.; Hwang, W.J. Blockchain for Edge of Things: Applications, Opportunities, and Challenges. IEEE Internet Things J. 2022, 9, 964–988. [Google Scholar] [CrossRef]
- McMahan, B.; Ramage, D. Federated Learning: Collaborative Machine Learning without Centralized Training Data. Available online: https://ai.googleblog.com/2017/04/federated-learning-collaborative.html (accessed on 1 November 2022).
- Brasilino, L.R.B.; Swany, M. Mitigating DDoS Flooding Attacks against IoT using Custom Hardware Modules. In Proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; pp. 58–64. [Google Scholar]
- Zhao, Y.; Cheng, G.; Duan, Y.; Gu, Z.; Zhou, Y.; Tang, L. Secure IoT edge: Threat situation awareness based on network traffic. Comput. Netw. 2021, 201, 108525. [Google Scholar] [CrossRef]
- Elnawawy, M.; Farhan, A.; Nabulsi, A.A.; Al-Ali, A.; Sagahyroon, A. Role of FPGA in Internet of Things Applications. In Proceedings of the 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Ajman, United Arab Emirates, 10–12 December 2019; pp. 1–6. [Google Scholar]
Ref# | Focus of Survey: Methodology | Discussed DDoS Attacks on IoT Sub-System | |||||
---|---|---|---|---|---|---|---|
SDN | BC | PG | SC | IoT | UDP | ||
1. [3] | DDoS Mitigation Techniques for IoT using Blockchain: Strengths and weaknesses | ✓ | ✓ | ✓ | |||
2. [16] | DDoS Detection Techniques for IoT using ML and deep learning: Attributes of detection technique | ✓ | |||||
3. [17] | botnet Detection Approaches for IoT: Comparative study of botnets and technique, dataset, entity detected, devices used, etc | ✓ | ✓ | ||||
4. [18] | DDoS Detection Approaches using Deep Learning: Preprocessing details, experimental values, and setups | ✓ | ✓ | ✓ | |||
5. [19] | DDoS Mitigation Technique using BC for IoT and SDN: Solution based on deployment location | ✓ | ✓ | ✓ | |||
6. [20] | DDoS Detection, Mitigation, and Prevention Techniques for Networks based on protocols such as TCP, UDP, ICMP using SDN and programmable data planes (PDP): Attributes of detection techniques | ✓ | |||||
7. [21] | DDoS Detection Technique using ML for SDN: Traffic-Analysis-related experiments | ✓ | ✓ | ✓ | |||
8. [22] | DDoS Detection Technique using ML for Network Services: Traceback-related experiments | ✓ | |||||
9. [23] | DDoS Detection Technique using ML for IoT: Description of ML techniques | ✓ | ✓ | ✓ | |||
10. [24] | DDoS prevention using SDN and Blockchain for IoT and Network services: Important properties of DDoS attacks and defense techniques | ✓ | ✓ | ||||
11. Ours | DDoS Detection using Blockchain, SCs, ML: Description of General Information, processes and methods to tackle DDoS attacks | ✓ | ✓ | ✓ | ✓ | ✓ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, Z.A.; Namin, A.S. A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology. Electronics 2022, 11, 3892. https://doi.org/10.3390/electronics11233892
Khan ZA, Namin AS. A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology. Electronics. 2022; 11(23):3892. https://doi.org/10.3390/electronics11233892
Chicago/Turabian StyleKhan, Zulfiqar Ali, and Akbar Siami Namin. 2022. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology" Electronics 11, no. 23: 3892. https://doi.org/10.3390/electronics11233892
APA StyleKhan, Z. A., & Namin, A. S. (2022). A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology. Electronics, 11(23), 3892. https://doi.org/10.3390/electronics11233892