Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
aut.relation.conference | The 3rd EAI International Conference on Safety and Security in Internet of Things | en_NZ |
aut.researcher | Cusack, Brian | |
dc.contributor.author | Cusack, B | en_NZ |
dc.contributor.author | Kyaw, A | en_NZ |
dc.contributor.author | Tian, Z | en_NZ |
dc.date.accessioned | 2018-12-17T23:26:37Z | |
dc.date.available | 2018-12-17T23:26:37Z | |
dc.date.copyright | 2016-12-23 | en_NZ |
dc.date.issued | 2016-12-23 | en_NZ |
dc.description.abstract | Society is faced with the ever more prominent concerns of vulnerabilities including hacking and DoS or DDoS attacks when migrating to new paradigms such as Internet of Things (IoT). These attacks against computer systems result in economic losses for businesses, public organizations and privacy disclosures. The IoT presents a new soft surface for attack. Vulnerability is now found in a multitude of personal and private devices that previously lacked connectivity. The ability to trace back to an attack origin is an important step in locating evidence that may be used to identify and prosecute those responsible. In this theoretical research, IP traceback methods are compared and evaluated for application, and then consolidated into a set of metrics for potential use against attackers. | |
dc.identifier.citation | Interoperability, Safety and Security in IoT. SaSeIoT 2016, InterIoT 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 190, pp. 127-138. | |
dc.identifier.uri | https://hdl.handle.net/10292/12115 | |
dc.publisher | Springer | |
dc.relation.uri | https://link.springer.com/chapter/10.1007/978-3-319-52727-7_14 | |
dc.rights | An author may self-archive an author-created version of his/her article on his/her own website and or in his/her institutional repository. He/she may also deposit this version on his/her funder’s or funder’s designated repository at the funder’s request or as a result of a legal obligation, provided it is not made publicly available until 12 months after official publication. He/ she may not use the publisher's PDF version, which is posted on www.springerlink.com, for the purpose of self-archiving or deposit. Furthermore, the author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at www.springerlink.com”. (Please also see Publisher’s Version and Citation). | |
dc.rights.accessrights | OpenAccess | en_NZ |
dc.subject | Attack origins; DoS; DDoS; TTL; Traceback; IoT security | |
dc.title | Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT | en_NZ |
dc.type | Conference Contribution | |
pubs.elements-id | 218469 | |
pubs.organisational-data | /AUT | |
pubs.organisational-data | /AUT/Design & Creative Technologies | |
pubs.organisational-data | /AUT/Design & Creative Technologies/Engineering, Computer & Mathematical Sciences |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- SaSeIoT 2016 Camera Ready Final - Zhuang Tian 2.pdf
- Size:
- 99.53 KB
- Format:
- Adobe Portable Document Format
- Description:
- Conference Contribution
License bundle
1 - 1 of 1
Loading...
- Name:
- RE4.10 Grant of Licence.docx
- Size:
- 14.05 KB
- Format:
- Microsoft Word 2007+
- Description: