Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani
{"title":"A Proposed Framework for Early Detection IoT Botnet","authors":"Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani","doi":"10.1109/ACIT57182.2022.9994166","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is an overgrowing technology in both consumer and business use. This technology can significantly affect people's daily lives by changing how people drink coffee and how smart things interact with different industries. IoT could be useful in a lot of different ways. It can give businesses more information about their business, which can help them become more efficient and save money. The sheer amount of data that is created, the size and variety of networks, and the security and privacy issues that come up all slow down development and implementation. In the past few decades, distributed denial-of-service (DDoS) attacks on Internet of Things (IoT) networks have been seen as one of the most critical and urgent problems. DDoS attacks use the limited resources of IoT devices, like storage space and network bandwidth, to cause problems in IoT applications. This study looks at the different attacks that can lead to DDoS, hurting systems already in place. In this paper, we examine the potential countermeasures to these types of attacks from the perspective of a restricted device.","PeriodicalId":256713,"journal":{"name":"2022 International Arab Conference on Information Technology (ACIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Arab Conference on Information Technology (ACIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIT57182.2022.9994166","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) is an overgrowing technology in both consumer and business use. This technology can significantly affect people's daily lives by changing how people drink coffee and how smart things interact with different industries. IoT could be useful in a lot of different ways. It can give businesses more information about their business, which can help them become more efficient and save money. The sheer amount of data that is created, the size and variety of networks, and the security and privacy issues that come up all slow down development and implementation. In the past few decades, distributed denial-of-service (DDoS) attacks on Internet of Things (IoT) networks have been seen as one of the most critical and urgent problems. DDoS attacks use the limited resources of IoT devices, like storage space and network bandwidth, to cause problems in IoT applications. This study looks at the different attacks that can lead to DDoS, hurting systems already in place. In this paper, we examine the potential countermeasures to these types of attacks from the perspective of a restricted device.