You are currently viewing a new version of our website. To view the old version click .
Systems
  • Article
  • Open Access

20 April 2023

Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory

,
,
and
1
Faculty of Information and Communication Technology (FICT), Universiti Tunku Abdul Rahman, Kampar 31900, Malaysia
2
Higher Colleges of Technology, Fujairah P.O. Box 4114, United Arab Emirates
*
Author to whom correspondence should be addressed.
This article belongs to the Topic SDGs 2030 in Buildings and Infrastructure

Abstract

Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to Smart Factory solutions and delivers insights. As a result, a complex and dynamic network with a vulnerability inherited from the Internet becomes an attractive target for hackers to attack critical infrastructures. Therefore, this paper selects three potential attacks with the evaluation of the protections, namely (1) distributed denial of service (DDoS), (2) address resolution protocol (ARP) spoofing, and (3) Internet protocol (IP) fragmentation attacks. In the DDoS protection, the F1-score, accuracy, precision, and recall of the four-feature random forest with principal component analysis (RFPCA) model are 95.65%, 97%, 97.06%, and 94.29%, respectively. In the ARP spoofing, a batch processing method adopts the entropy calculated in the 20 s window with sensitivity to network abnormalities detection of various ARP spoofing scenarios involving victims’ traffic. The detected attacker’s MAC address is inserted in the block list to filter malicious traffic. The proposed protection in the IP fragmentation attack is implementing one-time code (OTC) and timestamp fields in the packet header. The simulation shows that the method detected 160 fake fragments from attackers among 2040 fragments.

1. Introduction

Industry 4.0, called the Smart Factory, shown in Figure 1, is the phase of digitizing the manufacturing sector, which has been accelerated by exponential technologies and has vertical and horizontal integration across factory plants and supply chains [1]. Unlike the conventional sensor network, the IoT network is becoming more complex with heterogeneity that increases the connectivity and adopts standard communication protocols which link the physical components and receive commands through the Internet [2]. The revolution of Industry 4.0 has focused on flexibility and demand for customized products, and workshops are adaptive and scalable with a fast reconfiguration of machines. Cloud computing processes and shares data between cyber-physical systems (CPSs) [3]. A cyber-physical production system (CPPS) makes decentralized decisions in the production system in the virtual world [4]. In the Smart Factory, data are used in learning algorithms to support real-time intelligent and autonomously controlled systems [5,6].
Figure 1. A framework of a Smart Factory.
The highly Interconnected and dynamically distributed environments also led to a high complexity that opened opportunities for attackers [7]. The security of the Smart Factory becomes even more important with the adoption of IoT in critical applications that can be diverted into a harmful situation to the entire system. In common practice, the security of the Cloud is handled only partially by service providers, mainly focusing on facilities and data centers [8]. At the same time, the customer needs to pay attention to interfaces and data that the customer might forget. A similar breach in one machine, network, or plant can persist in another as the concept of “digital production” shares the same Cloud settings [9]. There are unclear policies and best practices for a manufacturer to build IoT, such as protection with a strong password which can suffer from a brute-force attack [10]. The characteristics of sensor nodes that are low power, limited processing, and have memory constraints have prevented them from being embedded with secure and advanced protection algorithms. The IoT environment needs more security attention to avoid issues caused by misconfiguration [11]. For example, a UPnP (universal plug and play) service that automatically connects the local nodes may be misused by an attacker and should be restricted or disabled. Physical access to the network with a USB plug-in is simple and most straightforward for a hacker to penetrate the network system.
IoT runs software that requires security patches [12] and is sometimes late in reaching the devices through the Internet connection [13]. The attacker can exploit the zero-day attack on these devices by extracting relevant details from the Shodan search engine. Another security breach can occur when the updates come from an unauthorized or unauthenticated third-party application, even if the devices run in a closed-loop system. While in sensor networks, there are various supports for wireless communication such as radio frequency identification (RFID), Z-wave, and near-field communication (NFC), the mainstream connectivity options are WiFi and Bluetooth, which use the same frequency. These wireless signals are susceptible to interception, thus creating a vulnerability for the attacker to capture and exploit the traffic in the IoT network.

3. Proposed Protection Mechanism

3.1. Random Forest

Random forest [32] is a machine learning algorithm that adopts the theory of many decision trees with the bagging technique. Each of the trees is called a forest and are not correlated with one another. Randomly selected attributes split the nodes in the decision tree without pruning. Additionally, the bootstrap method uses sampling with a replacement which can compensate for the situation of insufficient data to train the model. Figure 2 shows the prediction based on the average result of all the forests. Using the maximum voting technique, there is a high probability of getting the correct answers.
Figure 2. Random forest algorithm.

3.2. Principal Component Analysis

Principal component analysis (PCA) [33] is a technique for dimensionality reduction. It converts the original data into uncorrelated principal components (PCs) and arranges them from highest to lowest variance. The result for PCA is to transform the dataset into PCs with the highest possible variances. Thus, the first selected PC contributes the highest variance of the data.
The eigenvector U of matrix A and the λ which is the scalar eigenvalue for matrix A (square matrix) as in Equation (1):
A U = U λ
Equation (2) is the root of the characteristic equation, which is solved to obtain the value of λ :
d e t ( A λ I ) = 0 ,

3.3. Entropy-Based Detection

Shannon’s entropy [34,35] is an information theory that measures randomness and distribution. This method effectively detects an attack on networks, considering the massive traffic generated. When the attack occurs in the network, data collection and features can easily capture issues by deriving the abnormal behavior in the context. Some features used for entropy computation are source IP, destination IP, and protocol.

ARP Spoofing Analysis

H ( X ) = - i = 1 n p x i l o g b p ( x i ) ,
Algorithm 1 uses entropy (H) shown in Equation (3) to detect abnormality in the local network. The entropy in the ARP spoofing mainly falls to 1.3 [34]. In ARP spoofing activities, the entropy can achieve a high value, but not too high, compared to the normal ARP process. The threshold set by entropy can detect the abnormality in ARP traffic, which triggers detection and protection.
Let S be a set of ARP packets collected throughout the simulation, grouped by each time window W. The xi is the number of packets sent from a source. To calculate p(xi), xi is divided by a denominator of the total number of ARP packets at the time window or timeslot i. The b represents base 2 of a log.
The ARP traffic is collected at each time window and compared with the predefined threshold. The feature that applies in the context is using the sender’s MAC address. The entropy property shows the underlying probability distribution and describes the randomness of the flows in the observation point or location, in this case, the switch or access point (AP). The MAC address is selected to calculate the entropy of each time window. This feature shows the robustness of identifying the attacker’s behaviors correctly. If the attacker begins to screen the local network for all active IP addresses, this increases the randomness of the destination IP address. In the case of this paper, the sender’s MAC address can capture many ARP packets in the network traffic from the attacker.
Algorithm 1 Proposed ARP Spoofing Detect and Protect Based on Entropy
log_monitor_ip_mac: dictionary to keep IP-MAC mapping
Input: Time Window slot (W1. . . Wn) = S, Attr1 as sender MAC
Output:
Set Entropy threshold ← 1.35
for all Wi ∈ S do
//get entropy of the ARP traffic in current window slot
curEntropyAttr1 ← COMPUTE entropy of sender MAC
if (APi(MAC) in capture MAC address)
then
filterAttackerTraffic()
end if
//raise alarm
if (curEntropyAttr1 < Entropy threshold)
then
ARP List ← UNIQUE IP, MAC from a high volume of ARP packet’s in Wi
//get the Sender IP, MAC in ARP
MAC ← MAC in ARP List
IP ← IP in ARP List
length ← COUNT ARP List
if (length > 1)//duplicate address found
then
detect spoofing ← True
else
match ← matchMacToIp (IP, MAC, log_monitor_ip_mac)
if(!match) then
detect spoofing ← True
end if
end if
if (detect spoofing = True)
then
//keep the mac address in a list
UPDATE MAC in capture mac address
else
//keep the IP-MAC in dictionary for further validation
UPDATE IP, MAC in log_monitor_ip_mac
end if
end if

3.4. One-Time Code and Timestamp

The packet header identifier is vital on the Internet to a similar group of fragments and forms the original packets at the destination node.
The proposed mechanism is adding a timestamp and one-time code (OTC) in the fragment to protect against the fragmentation attack caused by a predictable identifier. The OTC and timestamp consume the option fields with a maximum of 40 bytes. The OTC is a number randomly generated parallel to the timestamp. With the additional fields added to the packet header, the attacker cannot force the reassembly of the fragments with only the source IP, destination IP, identification, and protocols. The following diagram shows the implementation of OTC and timestamp in Figure 3.
Figure 3. Proposed IPv4 header to include timestamp and OTC as an enhancement for fragmentation attack (misassociation) protection.
Type of service (TOS) or differentiated service code point (DSCP) specifies the different services like Voice over IP (VOIP). If the explicit congestion notification (ECN) is set, the system can send the notification of network congestion between endpoints, preventing packet drop. The Don’t Fragment (DF) field allows for the discovery of the path of the maximum transmission unit (MTU) and prevents fragmentation between communication nodes. When fragmentation occurs, all of the fragments except the last one will have the More Fragment (MF) field set to true, indicating that more fragments are coming.

3.5. Dataset

The dataset is prepared by randomly generating data points with features stated in Table 1. This record simulates the DDoS scenarios. The classifiers use this dataset to train a model for predicting potential attackers.
Table 1. Configuration of DDoS simulation data for attack and benign.

4. Simulations and Results

The hardware used to perform the analysis is a computer with Intel(R) Core(TM) i5-6200U CPU @ 2.30 GHz 2.40 GHz, 12 GB RAM with Windows 10 Home as the operating system. Simulation software is OMNeT++ [36] with an INET framework [37] as a model library. Execution of protection codes for DDoS and ARP spoofing was conducted in Python 3.8.8 with Spyder (Scientific Python Development Environment) IDE (integrated development environment). The customization in the INET framework for IP fragmentation protection code is needed to use the proposed packet format.

4.1. DDoS

DDoS simulates the infected devices, called bots, to synchronize the attack to target the server. The data are passed from the infected devices to a computer or gateway at each local network. Excessive data are flooding the server-side router, thus causing degradation of the services. The detection and protection mechanism are implemented in the simulation to recover the traffic. The models are evaluated based on predefined formulas described in the next section.

4.1.1. Simulation Analysis

The dataset comprises 65 percent benign traffic and 35 percent attack traffic generated from 100 nodes. The benign traffic consists of TCP and UDP data, and attack traffic is all from UDP data. Protocol, source port, destination port, and byte are features shown in Table 2. All of them are from numerical data types. The dataset is prepared based on the following mentioned criteria. First, attributes or features should not have missing or defective values. Second, attributes or features are verified with a correlation matrix. This method ensures that no highly correlated features (<0.8) exist among the features, which can prevent the curse of dimensionality in a model’s training process. Based on Figure 4, the highest correlation among independent attributes is between the protocol and byte, with 0.326. Third, features of data in the dataset are standardized by performing feature scaling. This method avoids the features with a higher range of values dominating the classifiers’ model.
Table 2. Dataset attributes.
Figure 4. Correlation matrix of the dataset attributes.
Table 3 shows the classifiers in comparison. The simulation configuration is shown in Table 4.
Table 3. Papers referring to DDoS.
Table 4. DDoS simulation parameters.
Below are predefined definitions.
TP = true positive, TN = true negative, FP = false positive, FN = false negative
The formulas adopted in the evaluation of classifiers are shown below.
Precision = TP/(TP + FP),
Recall = TP/(TP + FN),
Accuracy = (TP + TN)/(TP + TN + FP + FN),
F1-Score (a.k.a. F-Score) = 2 × (Precision × Recall)/(Precision + Recall),

4.1.2. Evaluation and Discussion

Precision and recall calculations are shown in Equations (4) and (5), respectively. The dataset was split into 75 percent for the training dataset and the remaining 25 percent for the test dataset. The classifiers’ performances are related to the convergence model to make a DDoS classification. Based on Table 5, the added features can improve the prediction in terms of accuracy. Figure 5 shows the F1-scores of each classifier’s predictions based on two, three, and four features. RF, KNN, and SVM classifiers have started with lower F1-scores in the two features model, which adopted protocol and source port to train a model. The scores increased in the three features model, which included the destination port. RFPCA prediction achieved a 95.65% F1-score and 97% accuracy using the dataset with four features to train the model.
Table 5. Comparison results of classifiers.
Figure 5. F1-score comparison of classifiers.
The same models in Figure 5 are applied in the DDoS classification problem presented in the simulation shown in Section 4.1.1. The entropy highlighted the different detection rates by the classifiers in the traffic analysis. Based on the model performance, training more features led to a more accurate model and may take more computation time. In Figure 6a, Figure 7a and Figure 8a, the entropy values were maintained between 5.43–5.57 in 0–0.5 s before the attack. The attack launched in 0.5–0.6 s, and entropy dropped to lower values showing that the attack was concentrated in the network and differentiating the detection rates between classifiers.
Figure 6. Comparison of detecting attacks and protecting networks of different models trained on two features. (a) Entropy-based analysis. (b) Log10 results with different models’ implementation.
Figure 7. Comparison of detecting attacks and protecting networks of different models trained on three features. (a) Entropy-based analysis. (b) Log10 results with different models’ implementation.
Figure 8. Comparison of detecting attacks and protecting networks of different models trained on four features. (a) Entropy-based analysis. (b) Log10 results with different models’ implementation.
According to Figure 6b, Figure 7b and Figure 8b, the high detection rates prevented the attack traffic from overwhelming the network. Before the attack, traffic was maintained between 2.15–2.35. In Figure 8b, RFPCA shows a quick recovery of the network back to the normal stage, which dropped to 3.08 at 0.6 s and was maintained between 2.32–2.34 after 0.6 s.
Based on the overall results, the recall rate contributed to classifying the attack traffic. High detection rate is essential to capturing an attack, while good classification models can protect and reduce maintenance costs. The high F1-score shows an overall performance ability to correctly classify the DDoS in an imbalanced dataset, which seeks to balance precision and recall. Both RFPCA and RF models trained using four features have a good classification model. RFPCA, which performed the PCA before the training, can maintain high variances of the sample features and lead to the overall prediction performance.

4.2. ARP Spoofing

ARP spoofing simulates the attack in the local network, which can be either wired or wireless communication. Various attack scenarios are adopted to compare the effectiveness of the detection and protection mechanisms.

4.2.1. Simulation Analysis

The simulation has three attack modes, as shown in Table 6, implemented with the configuration in Table 7. Table 8 shows the different methods of protection. The proposed method sets the entropy threshold to H < 1.35. In a typical ARP spoofing, the attacker screens the local network to identify the active IP in the local network and the attack follows based on the selected attack mode. The system identifies the ARP spoofing that has occurred, triggers the protection algorithm, and inserts rules to filter the ARP packet based on the attacker’s MAC.
Table 6. ARP spoofing attack mode.
Table 7. ARP spoofing simulation parameter.
Table 8. Comparison of detection and protection.

4.2.2. Evaluation and Discussion

In Figure 9a, Figure 10a and Figure 11a, entropy values dropped below the threshold in 0–80 s indicating that entropy can distinguish attack traffic and regular traffic well. Local nodes initiated the ARP processes were in a cache timeout in the 40–60 s range. Figure 9a and Figure 11a show that the victims were involved in the ARP process by responding to ARP requests, and the entropy values achieved 1.22 in Figure 9a and 1.27 in Figure 11a. In the following figures, the detection time of each method is compared with the total of ARP packets.
Figure 9. Mode-1 scenario in ARP spoofing. (a) Entropy of proposed method (b) The comparison results of different types of protection in a total of 363 packets.
Figure 10. Mode-2 scenario in ARP spoofing. (a) Entropy of proposed method (b) The comparison results of different types of protection in a total of 341 packets.
Figure 11. Mode-3 scenario in ARP spoofing. (a) Entropy of proposed method (b) The comparison results of different types of protection in a total of 322 packets.
In Figure 9b, the proposed method detected ARP spoofing and blocked the malicious traffic in 40 s. There was no action from Method-1 and Method-2, and the total ARP traffic remained at 305 attacks out of 363 packets.
In Figure 10b, Method-2 detected the attack in 20 s. This ARP packet adopted a gratuitous ARP variant in this attack to forge the target’s IP-MAC mapping. The proposed method detected ARP spoofing in 40 s. Method-1 blocked the attacker at 46 s. There was a total of 305 attacks out of 341 packets.
In Figure 11b, the attacker MAC could be identified after 45 s when the Node03 initiates an ARP request after the ARP cache timeout. Method-1 blocked the attacker at 51 s. The proposed method blocked the attacker in 60 s. There was no action reflected in Method-2 in this case, and the attacks remained at 270 out of 322 packets.
According to the results obtained, the proposed method can detect different spoofed ARP packets and automatically capture the suspicious address mapping matched with the attacker.

4.3. IP Fragmentation Attack (Mis-Association)

The server routes the firmware packets through the gateway to the IoT. Data transmission is subjected to limited computation and memory. The packet header identifier is predictable because it sends large packets to the target. The attackers launched the attack by sending fragments with the same identity. The attack attempts to merge an attack fragment with fragments from the server, leading to incorrect packet reassembling and the dropping of the packet.

4.3.1. Simulation Analysis

The configuration in Table 9 shows a simulation that has implemented the OTC and timestamp to confront and mitigate the fragmentation attack. All fragments from the same packet should have a similar identifier, source IP, and destination IP with valid OTC and timestamp. The validity of fragments is verified at the destination node after the reassembly process.
Table 9. Fragmentation attack parameters of the simulation.

4.3.2. Evaluation and Discussion

Based on Figure 12, the target IoT has received all the fragments sent from the gateway and attackers. Figure 13 shows that the destination IoT (target) detected all attackers’ fragments. The identifier plays a vital role in Internet-based communication, and the IoT can connect to a vulnerable WiFi network for communication. Attackers employed a method to randomly spot the identifier values by sending many fragments into the network to increase the chances of a successful attack on the IoT but have failed in all the attempts based on the simulation. The protection of OTC and timestamp has created difficulty for attackers to launch a successful IP fragmentation. Without any success of the fragments used by attackers, the destination node has received all the data correctly.
Figure 12. Total bytes from sender to receiver (end-to-end).
Figure 13. Fragment count and statuses.
In typical transmission, the data travel from different networks with different MTU sizes and cause fragmentation, especially when a large amount of data are involved. Only the first fragment carried the high-layer information essential for routing and network functionalities, which may lead to the retransmission of the entire packet, if lost. A general practice to avoid fragmentation in the first place requires additional transmission, and a TCP connection can cause an attacker to adopt alternative methods to attack. If the system can identify the attack immediately, the error may be corrected with a different transmission. In the worst cases, in which the attacker has launched maliciously, it can open a security breach in the network. Thus, protection for the packet header identifier contributes to the secure transmission of fragments with the identifier, which the operating system implemented straightforwardly, and the secure transmission is now protected.

5. Conclusions

In this paper, the proposed protection for DDoS, ARP spoofing, and IP fragmentation attacks are presented and discussed. Cybersecurity threats come from internal and external sources, and the attacks can be stealthy. These attacks are a common yet severe problem, and once they occur, they can cause massive damage to the infrastructure and loss to the organization. Several solutions have been proposed to solve the problems, each with advantages and disadvantages, and the detection rates and accuracy are varied. The proposed RF classifier with PCA can train a model that copes with dynamic environments and delivers good protection. The protection in ARP spoofing captures suspicious address mapping and is adaptable to different spoofed ARP packets. The protection of the packet header identifier solves the security breach in the IP-based communication, and the destination node can detect the fake fragments without impacting the reassembly process. The system should have sufficient protection capable of detecting the attack at the earliest chance, if not immediately, without impacting the organization’s productivity.

Author Contributions

Conceptualization, T.U.C., H.G.G. and V.P.; methodology, T.U.C.; software, T.U.C.; validation, T.U.C.; formal analysis, T.U.C.; investigation, T.U.C., S.-Y.L. and H.G.G.; writing—original draft preparation, T.U.C.; writing—T.U.C. and H.G.G.; visualization, T.U.C. and H.G.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the respected editor and reviewer for their support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Russmann, M.; Lorenz, M.; Gerbert, P.; Waldner, M.; Justus, J.; Engel, P.; Harnisch, M. Industry 4.0: The future of productivity and growth in manufacturing industries. Boston Consult. Group 2015, 9, 54–89. [Google Scholar]
  2. Chen, B.; Wan, J.; Shu, L.; Li, P.; Mukherjee, M.; Yin, B. Smart factory of industry 4.0: Key technologies, application case, and challenges. IEEE Access 2017, 6, 6505–6519. [Google Scholar] [CrossRef]
  3. Yao, X.; Zhou, J.; Lin, Y.; Li, Y.; Yu, H.; Liu, Y. Smart manufacturing based on cyber-physical systems and beyond. J. Intell. Manuf. 2019, 30, 2805–2817. [Google Scholar] [CrossRef]
  4. Nagy, J.; Olah, J.; Erdei, E.; Mate, D.; Popp, J. The role and impact of industry 4.0 and the internet of things on the business strategy of the value chain-the case of hungary. Sustainability 2018, 10, 3491. [Google Scholar] [CrossRef]
  5. Liu, Q.; Li, P.; Zhao, W.; Cai, W.; Yu, S.; Leung, V.C.M. A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE Access 2018, 6, 12103–12117. [Google Scholar] [CrossRef]
  6. Syafrudin, M.; Alfian, G.; Fitriyani, N.L.; Rhee, J. Performance analysis of IoT-based sensor, big data processing, and machine learning model for real-time monitoring system in automotive manufacturing. Sensors 2018, 18, 2946. [Google Scholar] [CrossRef] [PubMed]
  7. Sengupta, J.; Ruj, S.; das Bit, S. A secure fog-based architecture for industrial internet of things and industry 4.0. IEEE Trans. Ind. Inform. 2020, 17, 2316–2324. [Google Scholar] [CrossRef]
  8. Qi, Q.; Tao, F. A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access 2019, 7, 86769–88677. [Google Scholar] [CrossRef]
  9. Vaidya, S.; Ambad, P.; Bhosle, S. Industry 4.0—A glimpse. Procedia Manuf. 2018, 20, 233–238. [Google Scholar] [CrossRef]
  10. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT privacy and security: Challenges and solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
  11. Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
  12. Yu, M.; Zhuge, J.; Cao, M.; Shi, Z.; Jiang, L. A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices. Future Internet 2020, 12, 27. [Google Scholar] [CrossRef]
  13. Staddon, E.; Loscri, V.; Mitton, N. Attack categorisation for IoT applications in critical infrastructures, a survey. Appl. Sci. 2021, 11, 7228. [Google Scholar] [CrossRef]
  14. Lee, Y.; Chae, H.; Lee, K. Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices. Automatika 2021, 62, 127–136. [Google Scholar] [CrossRef]
  15. Li, D.; Yu, C.; Zhou, Q.; Yu, J. Using SVM to Detect DDoS Attack in SDN Network. J. Phys. Conf. Ser. 2019, 1237, 1–5. [Google Scholar] [CrossRef]
  16. Lohachab, A.; Karambir, B. Critical analysis of DDoS—An emerging security threat over IoT networks. J. Commun. Inf. Netw. 2018, 3, 57–78. [Google Scholar] [CrossRef]
  17. Butun, I.; Osterberg, P.; Song, H. Security of the internet of things: Vulnerabilities, attacks and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
  18. Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the mirai botnet. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, 16–18 August 2017; pp. 1093–1110. [Google Scholar]
  19. Sinanovic, H.; Mrdovic, S. Analysis of Mirai malicious software. In Proceedings of the 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 21–23 September 2017. [Google Scholar]
  20. Router and IoT Vulnerabilities: Insecure by Design; IOT Security Foundation: West Lothian, UK, 2021.
  21. Aytac, T.; Aydın, M.A.; Zaim, A.H. Detection DDoS attacks using machine learning methods. Electrica 2020, 20, 159–167. [Google Scholar] [CrossRef]
  22. Wang, S.; Gomez, K.; Sithamparanathan, K.; Asghar, M.R.; Russello, G.; Zanna, P. Mitigating DDoS attacks in SDN-based IoT networks leveraging secure control and data plane algorithm. Appl. Sci. 2021, 11, 929. [Google Scholar] [CrossRef]
  23. Sudar, K.M.; Beulah, M.; Deepalakshmi, P.; Nagaraj, P.; Chinnasamy, P. Detection of distributed denial of service attacks in SDN using machine learning techniques. In Proceedings of the 2021 International Conference on Computer Communication and Informatics, ICCCI 2021, Coimbatore, India, 27–29 January 2021; pp. 25–29. [Google Scholar]
  24. Dong, S.; Sarem, M. DDoS attack detection method based on Improved KNN with the degree of DDoS attack in software-defined networks. IEEE Access 2020, 8, 5039–5048. [Google Scholar] [CrossRef]
  25. Pei, J.; Chen, Y.; Ji, W. A DDoS attack detection method based on machine learning. J. Phys. Conf. Ser. 2019, 1237, 032040. [Google Scholar] [CrossRef]
  26. Gao, W.; Sun, Y.; Fu, Q.; Wu, Z.; Ma, X.; Zheng, K.; Huang, X. ARP poisoning prevention in internet of things. In Proceedings of the 9th International Conference on Information Technology in Medicine and Education (ITME), Hangzhou, China, 19–21 October 2018; pp. 733–736. [Google Scholar]
  27. Abid, M.; Singh, A. ARP spoofing detection via wireshark and veracode. Int. J. New Technol. Res. 2018, 4, 263063. [Google Scholar]
  28. Aly, M.; Khomh, F.; Gueheneuc, Y.G.; Washizaki, H.; Yacout, S. Is fragmentation a threat to the success of the internet of things. IEEE Internet Things J. 2019, 6, 472–487. [Google Scholar] [CrossRef]
  29. Feng, X.; Li, Q.; Sun, K.; Xu, K.; Liu, B.; Zheng, X.; Yang, Q.; Duan, H.; Qian, Z. PMTUD is not panacea: Revisiting IP fragmentation attacks against TCP. In Proceedings of the Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–28 April 2022. [Google Scholar]
  30. Suciu, I.; Vilajosana, X.; Adelantado, F. An analysis of packet fragmentation impact in LPWAN. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018. [Google Scholar]
  31. Dai, T.; Shulman, H.; Waidner, M. DNS-over-TCP considered vulnerable. In Proceedings of the Applied Networking Research Workshop (ANRW), New York, NY, USA, 24–30 July 2021; pp. 76–81. [Google Scholar]
  32. Mohandoss, P.; Shi, Y.; Suo, K. Outlier prediction using random forest classifier. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 27–30 January 2021. [Google Scholar]
  33. Hoang, D.H.; Nguyen, H.D. A PCA-based method for IoT network traffic anomaly detection. In Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon, Republic of Korea, 11–14 February 2018; pp. 381–386. [Google Scholar]
  34. Alghawli, S. Complex methods detect anomalies in real time based on time series analysis. Alex. Eng. J. 2022, 61, 549–561. [Google Scholar] [CrossRef]
  35. Komazec, T.; Gajin, S. Analysis of flow-based anomaly detection using shannon’s entropy. In Proceedings of the 27th Telecommunications Forum (TELFOR), Belgrade, Serbia, 26–27 November 2019; pp. 1–4. [Google Scholar]
  36. OMNeT++. Omnet++ Discrete Event Simulator. Available online: omnetpp.org (accessed on 10 January 2023).
  37. INET. Inet Framework. Available online: https://inet.omnetpp.org/Introduction.htm (accessed on 10 January 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.