메뉴 건너뛰기




Volumn 47, Issue 3, 2015, Pages 8-15

Communication security in internet of thing: Preventive measure and avoid DDoS attack over IoT network

Author keywords

DDoS attack defensive mechanism; IoT; Network communication simulation

Indexed keywords

COMPUTER CRIME; DENIAL-OF-SERVICE ATTACK; INTERNET; NETWORK SECURITY; REMOTE CONTROL;

EID: 84937792152     PISSN: 07359276     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (105)

References (25)
  • 2
    • 1242321281 scopus 로고    scopus 로고
    • DDoS attacks and defense mechanisms: Classification and state-of-the-art
    • (April 5, )
    • Douligeris, Christos, and Aikaterini Mitrokotsa. "DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art." Computer Networks 44, no. 5 (April 5, 2004): 643-66. doi:10.1016/j.comnet.2003.10.003.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 6
    • 84875214013 scopus 로고    scopus 로고
    • A cross-layer communication module for the internet of things
    • (February 26)
    • Han, Chong, Josep Miquel Jornet, Etimad Fadel, and Ian F. Akyildiz. "A Cross-Layer Communication Module for the Internet of Things." Computer Networks 57, no. 3 (February 26, 2013): 622-33. doi: 10.1016/j .comnet.2012.10.003.
    • (2013) Computer Networks , vol.57 , Issue.3 , pp. 622-633
    • Han, C.1    Jornet, J.M.2    Fadel, E.3    Akyildiz, I.F.4
  • 8
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and Implications for CDNs and Web Sites
    • New York, NY, USA: ACM
    • Jung, Jaeyeon, Balachander Krishnamurthy, and Michael Rabinovich. "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites." In Proceedings of the 11th International Conference on World Wide Web, 293- 304. WWW '02. New York, NY, USA: ACM, 2002. doi:10.1145/51144511485.
    • (2002) Proceedings of the 11th International Conference on World Wide Web WWW '02 , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 11
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • (April)
    • Mirkovic, Jelena, and Peter Reiher. "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms." SIGCOMM Comput. Commun. Rev. 34, no. 2 (April 2004): 39-53. doi: 10.1145/997150.997156.
    • (2004) SIGCOMM Comput. Commun. Rev , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 13
    • 77955715403 scopus 로고    scopus 로고
    • An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks
    • (July)
    • Misra, Sudip, P. Venkata Krishna, Kiran Isaac Abraham, Navin Sasikumar, and S. Fredun. "An Adaptive Learning Routing Protocol for the Prevention of Distributed Denial of Service Attacks in Wireless Mesh Networks." Computers & Mathematics with Applications 60, no. 2 (July 2010): 294-306. doi: 10.1016/j.camwa.2009.12.035.
    • (2010) Computers & Mathematics with Applications , vol.60 , Issue.2 , pp. 294-306
    • Misra, S.1    Krishna, P.V.2    Abraham, K.I.3    Sasikumar, N.4    Fredun, S.5
  • 16
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS Problemsr
    • (April)
    • Peng, Tao, Christopher Leckie, and Kotagiri Ramamohanarao. "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problemsr ACM Comput. Surv. 39, no. 1 (April 2007). doi:10.1145/1216370.1216373.
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 18
    • 84937802116 scopus 로고    scopus 로고
    • Contiki programming course: Hands-on session notes
    • Science, Swedish Institute of Computer, and Oct, Accessed May 2, 2014
    • Science, Swedish Institute of Computer, and Oct 2008. "Contiki Programming Course: Hands-On Session Notes." TechRepublic. Accessed May 2, 2014. http://www.techrepublic.com/resource-library/whitepapers/contiki-programming-course-hands-on-session-notes/.
    • (2008) TechRepublic
  • 20
    • 84893461294 scopus 로고    scopus 로고
    • DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
    • Los Alamitos, CA, USA: IEEE Computer Society
    • Tao, Yuan, and Shui Yu. "DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics." In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 233-40. Los Alamitos, CA, USA: IEEE Computer Society, 2013. doi: 10.1109/TrustCom.2013.32.
    • (2013) 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , pp. 233-240
    • Tao, Y.1    Yu, S.2
  • 21
    • 33749377422 scopus 로고    scopus 로고
    • A comprehensive categorization of DDoS attack and DDoS defense techniques
    • Tariq, Usman, ManPyo Hong, and Kyung-suk Lhee. "A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques." Advanced Data Mining and Applications 4093 (n.d.): 1025-36.
    • Advanced Data Mining and Applications , vol.4093 , pp. 1025-1036
    • Tariq, U.1    Hong, M.2    Lhee, K.-S.3
  • 22
    • 74949143896 scopus 로고    scopus 로고
    • Internet of Things - New Security and Privacy Challenges
    • (January)
    • Weber, Rolf H. "Internet of Things - New Security and Privacy Challenges." Computer Law & Security Review 26, no. 1 (January 2010): 23-30. doi: 10.1016/j .clsr.2009.11.008.
    • (2010) Computer Law Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 24
    • 84880777977 scopus 로고    scopus 로고
    • Research on redundant channel model based on spatial correlation in IOT
    • edited by Yuyu Yuan, Xu Wu, and Yueming Lu Communications in Computer and Information Science 320. Springer Berlin Heidelberg, Springer Berlin Heidelberg
    • Zhang, Fangjiao, Wei Guo, Jincui Yang, Fangfang Yuan, and Lidong Zhai. "Research on Redundant Channel Model Based on Spatial Correlation in IOT." In Trustworthy Computing and Services, edited by Yuyu Yuan, Xu Wu, and Yueming Lu, 666-72. Communications in Computer and Information Science 320. Springer Berlin Heidelberg, 2013. http://0-link.springer.com.maurice.bgsu.edu/chapter/10.1007/978-3-642-35795-4-84.
    • (2013) Trustworthy Computing and Services , pp. 666-672
    • Zhang, F.1    Guo, W.2    Yang, J.3    Yuan, F.4    Zhai, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.