메뉴 건너뛰기




Volumn 16, Issue 11, 2016, Pages

A methodological approach for assessing amplified reflection distributed denial of service on the internet of things

Author keywords

Amplified reflection; Distributed denial of service; Pentest; Risk management; Vulnerability assessment

Indexed keywords

ACCESS CONTROL; COMPUTER CRIME; DATA PRIVACY; INTERNET OF THINGS; NETWORK SECURITY; RISK ASSESSMENT; RISK MANAGEMENT; WEB SERVICES;

EID: 84995489061     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s16111855     Document Type: Article
Times cited : (18)

References (56)
  • 1
    • 84999947276 scopus 로고    scopus 로고
    • Allen, N. Cybersecurity Weaknesses Threaten to Make Smart Cities More Costly and Dangerous Than Their Analog Predecessors. Available online: http://eprints.lse.ac.uk/65816/ (accessed on 10 May 2016).
  • 2
    • 84999918473 scopus 로고    scopus 로고
    • Wueest, C. The Continued Rise of DDoS Attacks. 2014. Available online: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-continued-rise-of-ddos-attacks.pdf (accessed on 10 May 2016).
  • 3
    • 84999904116 scopus 로고    scopus 로고
    • Jackson, W. How Hackers Can Turn the Internet of Things into a Weapon; GCN: Public Sector Media Group: Vienna, VA, USA; 2013. Available online: https://gcn.com/blogs/cybereye/2013/05/how-hackers-turninternet- of-things-into-weapon.aspx (accessed on 10 May 2016).
  • 4
    • 84999929531 scopus 로고    scopus 로고
    • Cox, R. 5 Notorious DDoS Attacks in 2013: Big Problem for the Internet of Things; SiliconANGLE Media Inc.: Palo Alto, CA, USA; 2013. Available online: http://siliconangle.com/blog/2013/08/26/5-notorious-ddosattacks- in-2013-big-problem-for-the-internet-of-things/ (accessed on 10 May 2016).
  • 5
    • 84999921495 scopus 로고    scopus 로고
    • Sharon, S. 2015 DDoS Attacks on the Rise, Attackers Shift Tactics; TechTarget Network: Newton, MA, USA; 2015. Available online: http://searchsecurity.techtarget.com/news/4500246858/2015-DDoS-attacks-on-therise- attackers-shift-tactics (accessed on 10 May 2016).
  • 6
    • 84999952535 scopus 로고    scopus 로고
    • Toms, L. Closed for Business–The Impact of Denial of Service Attacks in the IoT; GlobalSign GMO Internet Group: Portsmouth, NH, USA; 2016. Available online: https://www.globalsign.com/en/blog/denial-of-service-inthe- iot/ (accessed on 10 May 2016).
  • 7
    • 0041065277 scopus 로고
    • The InternetWorm Program: An Analysis
    • Spafford, E.H. The InternetWorm Program: An Analysis. SIGCOMM Comput. Commun. Rev. 1989, 19, 17–57.
    • (1989) SIGCOMM Comput. Commun. Rev , vol.19 , pp. 17-57
    • Spafford, E.H.1
  • 8
    • 84999979204 scopus 로고    scopus 로고
    • Stoll, C. The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage; Doubleday: New York, NY, USA, 1989.
  • 11
    • 85001025971 scopus 로고    scopus 로고
    • The Internet of Things: New Interoperability, Management and Security Challenges
    • Elkhodr, M.; Shahrestani, S.; Cheung, H. The Internet of Things: New Interoperability, Management and Security Challenges. Int. J. Netw. Secur. Its Appl. 2016, 8, 85–102.
    • (2016) Int. J. Netw. Secur. Its Appl , vol.8 , pp. 85-102
    • Elkhodr, M.1    Shahrestani, S.2    Cheung, H.3
  • 12
    • 84987624024 scopus 로고    scopus 로고
    • Cvitic, I.; Vujic, M.; Husnjak, S. Classification of Security Risks in the IoT Environment. In Proceedings of the 26th DAAAM International Symposium on Intelligent Manufacturing and Automation, Zadar, Croatia, 21–24 October 2015.
  • 15
    • 84939134219 scopus 로고    scopus 로고
    • Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May
    • Arış, A.; Oktuğ, S.F.; Yalçın, S.B.Ö. Internet-of-Things security: Denial of service attacks. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16–19 May 2015; pp. 903–906.
    • (2015) Internet-Of-Things Security: Denial of Service Attacks , pp. 903-906
    • Arış, A.1    Oktuğ, S.F.2    Yalçın, S.B.Ö.3
  • 17
    • 84960343798 scopus 로고    scopus 로고
    • Proceedings of the International Conference on ICT for Sustainable Development: ICT4SD, Ahmedabad, India, 3–4 July 2015; Springer: Heidelberg, Germany
    • Sonar, K.; Upadhyay, H. An Approach to Secure Internet of Things Against DDoS. In Proceedings of the International Conference on ICT for Sustainable Development: ICT4SD, Ahmedabad, India, 3–4 July 2015; Springer: Heidelberg, Germany, 2016; Volume 2, pp. 367–376.
    • (2016) An Approach to Secure Internet of Things against Ddos , vol.2 , pp. 367-376
    • Sonar, K.1    Upadhyay, H.2
  • 18
    • 84937792152 scopus 로고    scopus 로고
    • Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network
    • Society for Computer Simulation International: San Diego, CA, USA
    • Zhang, C.; Green, R. Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network. In Proceedings of the 18th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April 2015; Society for Computer Simulation International: San Diego, CA, USA, 2015; pp. 8–15.
    • (2015) Proceedings of the 18Th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April , vol.2015 , pp. 8-15
    • Zhang, C.1    Green, R.2
  • 20
    • 84995501226 scopus 로고    scopus 로고
    • Hu, F. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations; CRC Press: Boca Raton, FL, USA, 2016.
  • 21
    • 84901951363 scopus 로고    scopus 로고
    • Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 19–22 February
    • Sgouras, K.I.; Birda, A.D.; Labridis, D.P. Cyber attack impact on critical Smart Grid infrastructures. In Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 19–22 February 2014; pp. 1–5.
    • (2014) Cyber Attack Impact on Critical Smart Grid Infrastructures , pp. 1-5
    • Sgouras, K.I.1    Birda, A.D.2    Labridis, D.P.3
  • 23
    • 84960861247 scopus 로고    scopus 로고
    • Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 11–13 March
    • Nagpal, B.; Sharma, P.; Chauhan, N.; Panesar, A. DDoS tools: Classification, analysis and comparison. In Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 11–13 March 2015, pp. 342–346.
    • (2015) Ddos Tools: Classification, Analysis and Comparison , pp. 342-346
    • Nagpal, B.1    Sharma, P.2    Chauhan, N.3    Panesar, A.4
  • 24
    • 84994193625 scopus 로고    scopus 로고
    • The innocent perpetrators: Reflectors and reflection attacks. Adv. Comput
    • Arukonda, S.; Sinha, S. The innocent perpetrators: Reflectors and reflection attacks. Adv. Comput. Sci. 2015, 4, 94–98.
    • (2015) Sci , vol.4 , pp. 94-98
    • Arukonda, S.1    Sinha, S.2
  • 25
    • 84999954801 scopus 로고    scopus 로고
    • Bright, P. Spamhaus DDoS Grows to Internet-Threatening Size. 2013. Available online: http://arstechnica.com/security/2013/03/spamhaus-ddos-grows-to-internetthreatening-size/ (accessed on 12 May 2016).
  • 26
    • 84999903990 scopus 로고    scopus 로고
    • Prince, M. The DDoS That Knocked Spamhaus Offline (and HowWe Mitigated It). 2013. Available online: https://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho/ (accessed on 12 May 2016).
  • 27
    • 84999911634 scopus 로고    scopus 로고
    • US-CERT. Alert (TA14-017A UDP-Based Amplification Attacks). 2014. Available online: https://www.uscert.gov/ncas/alerts/TA14-017A (accessed on 12 May 2016).
  • 28
    • 84999908252 scopus 로고    scopus 로고
    • Goodin, D. Record-Breaking DDoS Reportedly Delivered by >145 k Hacked Cameras. 2016. Available online: http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliverinternets- biggest-ddos-ever/ (accessed on 9 October 2016).
  • 29
    • 84999951101 scopus 로고    scopus 로고
    • Herzog, P. Open Source Security Testing Methodology Manual (OSSTMM). Available online: https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance:March_2015.pdf (accessed on 9 August 2016).
  • 30
    • 84999917345 scopus 로고    scopus 로고
    • Penetration Testing Execution Standard: Penetration Testing Execution Standard. Available online: http://www.pentest-standard.org (accessed on 9 August 2016).
  • 31
    • 84999984789 scopus 로고    scopus 로고
    • SANS Institute. Conducting a Penetration Test on an Organization. Available online: http://resources.infosecinstitute.com/penetration-testing-methodology-web-applications/ (accessed on 9 August 2016).
  • 32
    • 84999986760 scopus 로고    scopus 로고
    • OWASP Testing Guide. Available online: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents (accessed on 9 August 2016).
  • 33
    • 84999887983 scopus 로고    scopus 로고
    • Conducting a Penetration Test on an Organization. Available online: http://www.sans.org/reading-room/whitepapers/auditing/conducting-penetration-test-organization-67 (accessed on 9 August 2016).
  • 34
    • 84999954855 scopus 로고    scopus 로고
    • PCI Data Security Standard (PCI DSS), Information Supplement: Penetration Testing Guidance, Version: 1.0. Available online: https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance: March_2015.pdf (accessed on 9 August 2016).
  • 36
    • 84999977472 scopus 로고    scopus 로고
    • Scarfone, K.A.; Souppaya, M.P.; Cody, A.; Orebaugh, A.D. SP 800-115. Technical Guide to Information Security Testing and Assessment; Technical Report; NIST: National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA, 2008.
  • 37
    • 84999932454 scopus 로고    scopus 로고
    • Shewhart, W.A. Statistical Method from the Viewpoint of Quality Control; Courier Corporation: North Chelmsford, MA, USA, 1939.
  • 38
    • 84999951397 scopus 로고    scopus 로고
    • Deming, W.E. Out of the Crisis; MIT Center for Advanced Engineering Study; MIT Press: Cambridge, MA, USA, 1986.
  • 39
    • 84999904603 scopus 로고    scopus 로고
    • Boyd, J.R. Patterns of Conflict; Unpublished briefing, 1986. Available online: http://www.dnipogo.org/ boyd/pdf/poc.pdf (accessed on 20 October 2015).
  • 40
    • 84999888083 scopus 로고    scopus 로고
    • Boyd, J.R. A Discourse on Winning and Losing; Unpublished briefing, 1996. Available online: http://dnipogo.org/john-r-boyd/ (accessed on 20 October 2015).
  • 41
    • 84999969193 scopus 로고    scopus 로고
    • McDowell, M. Understanding Denial-of-Service Attacks; Technical Report; US Department of Homeland Security: Washington, DC, USA, 2009.
  • 43
    • 84999913070 scopus 로고    scopus 로고
    • Kenney, M. Ping of Death. 1996. Available online: http://insecure.org/sploits/ping-o-death.html (accessed on 21 October 2014).
  • 44
    • 0003375670 scopus 로고    scopus 로고
    • An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
    • Paxson, V. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM SIGCOMM Computer Commun. Rev. 2001, 31, 38–47.
    • (2001) ACM SIGCOMM Computer Commun. Rev , vol.31 , pp. 38-47
    • Paxson, V.1
  • 45
    • 79961227245 scopus 로고    scopus 로고
    • IP Spoofing
    • Cisco Press: San Jose, CA USA. Available online, (accessed on 20 October 2015)
    • Ali, F. IP Spoofing. The Internet Journal, vol. 10, no. 4, Dec 2007. Cisco Press: San Jose, CA USA. Available online: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_10-4/104_ip-spoofing.html (accessed on 20 October 2015).
    • (2007) The Internet Journal , vol.10 , Issue.4
    • Ali, F.1
  • 46
    • 84999972612 scopus 로고    scopus 로고
    • Rossow, C. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proceedings of the 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, CA, USA, 23–26 February 2014.
  • 47
    • 84999945222 scopus 로고    scopus 로고
    • Allweyer, T. BPMN 2.0: Introduction to the Standard for Business Process Modeling; ISBN-10: 383709331X, ISBN-13: 978-3837093315 BoD–Books on Demand; Stoughton, WI, USA, 2010.
  • 48
    • 84999956851 scopus 로고    scopus 로고
    • Transactional Process–Construction: Bizagi Process Modeler. Available online: http://www.bizagi.com (accessed on 20 October 2014).
  • 50
    • 84999897146 scopus 로고    scopus 로고
    • UPnP Forum. UPnP Device Architecture Version 1.0, Revised on 24 April 2008. (Open Conectivity Foundation: Beaverton, OR, USA.) Available online: http://www.upnp.org/specs/arch/UPnP-arch-DeviceArchitecture-v1.0-20080424.pdf (accessed on 20 October 2015).
  • 52
    • 84999990839 scopus 로고    scopus 로고
    • Prolexic. Threat Advisory: SNMP Reflection DDoS Attacks. 2015. Available online: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/snmp-reflector-attacks-threat-advisory.pdf (accessed on 15 May 2015).
  • 55
    • 84999950003 scopus 로고    scopus 로고
    • Open SNMP Scanning Project. 2016. Available online: https://snmpscan.shadowserver.org (accessed on 10 January 2016).
  • 56
    • 84999969305 scopus 로고    scopus 로고
    • Wireshark Foundation. 2015. Available online: https://www.wireshark.org (accessed on 15 October 2015).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.