14
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios

      review-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Internet of Things (IoT) has attracted much attention from the Information and Communication Technology (ICT) community in recent years. One of the main reasons for this is the availability of techniques provided by this paradigm, such as environmental monitoring employing user data and everyday objects. The facilities provided by the IoT infrastructure allow the development of a wide range of new business models and applications (e.g., smart homes, smart cities, or e-health). However, there are still concerns over the security measures which need to be addressed to ensure a suitable deployment. Distributed Denial of Service (DDoS) attacks are among the most severe virtual threats at present and occur prominently in this scenario, which can be mainly owed to their ease of execution. In light of this, several research studies have been conducted to find new strategies as well as improve existing techniques and solutions. The use of emerging technologies such as those based on the Software-Defined Networking (SDN) paradigm has proved to be a promising alternative as a means of mitigating DDoS attacks. However, the high granularity that characterizes the IoT scenarios and the wide range of techniques explored during the DDoS attacks make the task of finding and implementing new solutions quite challenging. This problem is exacerbated by the lack of benchmarks that can assist developers when designing new solutions for mitigating DDoS attacks for increasingly complex IoT scenarios. To fill this knowledge gap, in this study we carry out an in-depth investigation of the state-of-the-art and create a taxonomy that describes and characterizes existing solutions and highlights their main limitations. Our taxonomy provides a comprehensive view of the reasons for the deployment of the solutions, and the scenario in which they operate. The results of this study demonstrate the main benefits and drawbacks of each solution set when applied to specific scenarios by examining current trends and future perspectives, for example, the adoption of emerging technologies based on Cloud and Edge (or Fog) Computing.

          Related collections

          Most cited references78

          • Record: found
          • Abstract: not found
          • Article: not found

          Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Blockchains and Smart Contracts for the Internet of Things

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                29 May 2020
                June 2020
                : 20
                : 11
                : 3078
                Affiliations
                [1 ]LaTARC Research Lab (IFRN), Federal Institute of Education, Science and Technology of Rio Grande do Norte (IFRN), Natal, RN 59015-000, Brazil; esau.silva@ 123456academico.ifrn.edu.br (E.S.); emidio.paiva@ 123456ifrn.edu.br (E.P.N.); marciliolemos@ 123456ppgsc.ufrn.br (M.L.)
                [2 ]Department of Informatics and Applied Mathematics (DIMAp), Federal University of Rio Grande do Norte (UFRN), Natal, RN 59078-970, Brazil; augusto@ 123456dimap.ufrn.br
                [3 ]Instituto de Telecomunicações, 3810-193 Aveiro, Portugal
                [4 ]Department of Computer Science, Saint Louis University, Saint Louis, MO 63103, USA; flavio.esposito@ 123456slu.edu
                Author notes
                Author information
                https://orcid.org/0000-0003-4261-9138
                https://orcid.org/0000-0002-0354-7568
                https://orcid.org/0000-0003-0518-7006
                https://orcid.org/0000-0003-0387-6414
                https://orcid.org/0000-0002-9936-3770
                https://orcid.org/0000-0002-7798-4584
                Article
                sensors-20-03078
                10.3390/s20113078
                7309081
                32485943
                1a14cdf2-f35d-4012-a5de-f037c43e8969
                © 2020 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 01 May 2020
                : 19 May 2020
                Categories
                Review

                Biomedical engineering
                distributed denial of service attacks (ddos),software-defined networking (sdn),internet of things (iot),taxonomy,revision,state-of-the-art

                Comments

                Comment on this article