Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Trustworthy Computing for Secure Smart Cities
Article type: Research Article
Authors: Sharma, Deepak Kumara; * | Devgan, Manishb | Malik, Gauravb | Dutt, Prashantb | Goel, Aartia | Gupta, Deepakc | Al-Turjman, Fadid
Affiliations: [a] Department of Information Technology, Netaji Subhas University of Technology, New Delhi, India. E-mails: dk.sharma1982@yahoo.com, aartigoelcse@gmail.com | [b] Division of Information Technology, Netaji Subhas Institute of Technology, New Delhi, India. E-mails: Manish.nsit8@gmail.com, gauravmalik2603@gmail.com, prashantdutt11@gmail.com | [c] Maharaja Agrasen Institute of Technology, Delhi, India. E-mail: deepakgupta@mait.ac.in | [d] Artificial Intelligence Department, Research Centre for AI and IoT, Near East University, Nicosia, Turkey. E-mail: fadi.alturjman@neu.edu.tr
Correspondence: [*] Corresponding author. E-mail: dk.sharma1982@yahoo.com.
Abstract: The world of computation has shown wide variety of wonders in the past decade with Internet of Things (IoT) being one of the most promising technology. Emergence of IoT brings a lot of good to the technology pool with its capability to provide intelligent services to the users. With ease to use, IoT is backed by a strong Cloud based infrastructure which allows the sensory IoT devices to perform specific functions. Important features of cloud are its reliability and security where the latter must be dealt with proper care. Cloud centric systems are susceptible to Denial of Service (DoS) attacks wherein the cloud server is subjected to an overwhelming number of incoming requests by a malicious device. If the same attack is carried out by a network of devices such as IoT devices then it becomes a Distributed DoS (DDoS) attack. A DDoS attack may render the server useless for a long period of time causing the services to crash due to extensive load. This paper proposes a lightweight, efficient and robust method for DDoS attack by detecting the compromised node connected to the Fog node or edge devices before it reaches the cloud by taking advantage of the Fog layer and prevent it from harming any information recorded or from increasing the unnecessary traffic in a network. The chosen technology stack consists of languages and frameworks which allow proposed approach to works in real time complexity for faster execution and is flexible enough to work on low level systems such as the Fog nodes. The proposed approach uses mathematical models for forecasting data points and therefore does not rely on a computationally heavy approach such as neural networks for predicting the expected values. This approach can be easily modelled into the firmware of the system and can help make cloud services more reliable by cutting off rogue nodes that try to attack the cloud at any given point of time.
Keywords: Fog computing, DDoS attacks, DDoS prevention, network anomalies, IoT DDoS
DOI: 10.3233/AIS-210600
Journal: Journal of Ambient Intelligence and Smart Environments, vol. 13, no. 3, pp. 201-217, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl