DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique

This study is grounded in a comprehensive review of literature on smart homes and Distributed Denial of Service (DDoS) attacks. To evaluate the defensive capabilities of pfSense and Suricata, a simulated Slowloris DDoS attack was performed on a smart home network, both with and without these securit...

Full description

Bibliographic Details
Published in:International Journal on Informatics Visualization
Main Author: Ibrahim M.I.; Darus M.Y.
Format: Article
Language:English
Published: Politeknik Negeri Padang 2024
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85217212340&doi=10.62527%2fjoiv.8.4.2175&partnerID=40&md5=125835b850a41b00e8e20b4852026a96
id 2-s2.0-85217212340
spelling 2-s2.0-85217212340
Ibrahim M.I.; Darus M.Y.
DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
2024
International Journal on Informatics Visualization
8
4
10.62527/joiv.8.4.2175
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85217212340&doi=10.62527%2fjoiv.8.4.2175&partnerID=40&md5=125835b850a41b00e8e20b4852026a96
This study is grounded in a comprehensive review of literature on smart homes and Distributed Denial of Service (DDoS) attacks. To evaluate the defensive capabilities of pfSense and Suricata, a simulated Slowloris DDoS attack was performed on a smart home network, both with and without these security measures. Data was collected for each attack instance, followed by an analysis of the attack's effectiveness and the botnets' responses to refine DDoS assault strategies targeting smart home networks. The results revealed that the network was highly vulnerable without defense mechanisms, collapsing under the attack. In contrast, implementing pfSense and Suricata enabled swift detection and mitigation, neutralizing the attack within 15 seconds. Further testing involved five different scenarios, each assessing the ability of these systems to detect and block DDoS attacks. In all cases, the attacks were identified within 60 seconds. Attackers varied HTTP headers to flood IP-based cameras with packets ranging from 500 to 3000. The findings highlight the significant vulnerability of IoT devices in smart homes to cyber threats. However, deploying pfSense and Suricata proved to be a practical approach for detecting and mitigating DDoS attacks. The research underscores the importance of selecting high-quality hardware, evaluating IoT security features, and adopting proactive security practices to bolster smart home security. © 2024, Politeknik Negeri Padang. All rights reserved.
Politeknik Negeri Padang
25499904
English
Article

author Ibrahim M.I.; Darus M.Y.
spellingShingle Ibrahim M.I.; Darus M.Y.
DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
author_facet Ibrahim M.I.; Darus M.Y.
author_sort Ibrahim M.I.; Darus M.Y.
title DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
title_short DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
title_full DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
title_fullStr DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
title_full_unstemmed DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
title_sort DDOS Attack Analysis on IoT Device for Smart Home Environment and A Proposed Detection Technique
publishDate 2024
container_title International Journal on Informatics Visualization
container_volume 8
container_issue 4
doi_str_mv 10.62527/joiv.8.4.2175
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85217212340&doi=10.62527%2fjoiv.8.4.2175&partnerID=40&md5=125835b850a41b00e8e20b4852026a96
description This study is grounded in a comprehensive review of literature on smart homes and Distributed Denial of Service (DDoS) attacks. To evaluate the defensive capabilities of pfSense and Suricata, a simulated Slowloris DDoS attack was performed on a smart home network, both with and without these security measures. Data was collected for each attack instance, followed by an analysis of the attack's effectiveness and the botnets' responses to refine DDoS assault strategies targeting smart home networks. The results revealed that the network was highly vulnerable without defense mechanisms, collapsing under the attack. In contrast, implementing pfSense and Suricata enabled swift detection and mitigation, neutralizing the attack within 15 seconds. Further testing involved five different scenarios, each assessing the ability of these systems to detect and block DDoS attacks. In all cases, the attacks were identified within 60 seconds. Attackers varied HTTP headers to flood IP-based cameras with packets ranging from 500 to 3000. The findings highlight the significant vulnerability of IoT devices in smart homes to cyber threats. However, deploying pfSense and Suricata proved to be a practical approach for detecting and mitigating DDoS attacks. The research underscores the importance of selecting high-quality hardware, evaluating IoT security features, and adopting proactive security practices to bolster smart home security. © 2024, Politeknik Negeri Padang. All rights reserved.
publisher Politeknik Negeri Padang
issn 25499904
language English
format Article
accesstype
record_format scopus
collection Scopus
_version_ 1825722578926305280