IOT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWANJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.10, No. 4)
Publication Date: 2021-04-30
Authors : S. E. Viswapriya; S. Dinesh; D. Viswa Ravi Teja;
Page : 17-21
Keywords : Jamming attacks; HTTP; IOT Security;
Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and mitigate. HTTP jamming, XML attack, DNS attacks, etc, are the various possible application layer attacks. The HTTP jamming is the most common and renowned application layer attack. There are various research solutions proposed by validating against HTTP jamming using tools such as Golden Eye, LOIC, proprietary tools, etc. The similar characteristics of the real Time HTTP jamming attack will not be exhibited by the HTTP jamming attacks. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node due to lack of communication infrastructure. In order to mitigate packet flood and replica flood attacks, two limits are used respectively. The claim-carry-and- check will notice the violation of both the limits easily. The inconsistency check against full claims is trivial. This is applicable to work in a distributed system. It will tolerate a little number of attackers for collision.
Other Latest Articles
Last modified: 2021-04-15 21:49:22