- -

ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author González-Landero, Franks es_ES
dc.contributor.author García-Magariño, Iván es_ES
dc.contributor.author Lacuesta Gilabert, Raquel es_ES
dc.contributor.author Lloret, Jaime es_ES
dc.date.accessioned 2020-05-07T05:57:23Z
dc.date.available 2020-05-07T05:57:23Z
dc.date.issued 2018-06 es_ES
dc.identifier.issn 1530-8669 es_ES
dc.identifier.uri http://hdl.handle.net/10251/142684
dc.description.abstract [EN] Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, sensing in smart homes, precision agriculture, underwater monitoring in aquaculture, and ambient-assisted living for healthcare. Efficient and secure data forwarding is essential to maintain seamless communications and to provide fast services. However, IoT devices and sensors usually have low processing capabilities and vulnerabilities. For example, attacks such as the Distributed Denial of Service (DDoS) can easily hinder sensor networks and IoT devices. In this context, the current approach presents an agent-based simulation solution for exploring strategies for defending from different DDoS attacks. The current work focuses on obtaining low-consuming defense strategies in terms of processing capabilities, so that these can be applied in sensor networks and IoT devices. The experimental results show that the simulator was useful for (a) defining defense and attack strategies, (b) assessing the effectiveness of defense strategies against attack ones, and (c) defining efficient defense strategies with low response times. es_ES
dc.description.sponsorship The authors acknowledge the research project "Construccion de un Framework para Agilizar el Desarrollo de Aplicaciones Moviles en el Ambito de la Salud" funded by University of Zaragoza and Foundation Ibercaja with Grant Reference JIUZ-2017-TEC-03. This work has been supported by the program "Estancias de Movilidad en el Extranjero Jose Castillejo para Jovenes Doctores" funded by the Spanish Ministry of Education, Culture and Sport with Reference CAS17/00005. The authors also acknowledge support from "Universidad de Zaragoza", "Fundacion Bancaria Ibercaja", and "Fundacion CAI" in the "Programa Ibercaja-CAI de Estancias de Investigacion" with Reference IT1/18. This work acknowledges the research project "Desarrollo Colaborativo de Soluciones AAL" with reference TIN2014-57028-R funded by the Spanish Ministry of Economy and Competitiveness. It has also been supported by "Organismo Autonomo Programas Educativos Europeos" with Reference 2013-1-CZ1-GRU06-14277. Furthermore, they acknowledge the "Fondo Social Europeo" and the "Departamento de Tecnologia y Universidad del Gobierno de Aragon" for their joint support with Grant no. Ref-T81. es_ES
dc.language Inglés es_ES
dc.publisher John Wiley & Sons es_ES
dc.relation.ispartof Wireless Communications and Mobile Computing es_ES
dc.rights Reconocimiento (by) es_ES
dc.subject.classification INGENIERIA TELEMATICA es_ES
dc.title ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1155/2018/7264269 es_ES
dc.relation.projectID info:eu-repo/grantAgreement/UNIZAR//JIUZ-2017-TEC-03/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/MECD//CAS17%2F00005/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/MINECO//TIN2014-57028-R/ES/DESARROLLLO COLABORATIVO DE SOLUCIONES AAL/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/OAPEE//2013-1-CZ1-GRU06-14277/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/Gobierno de Aragón//Ref-T81/ es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions es_ES
dc.description.bibliographicCitation González-Landero, F.; García-Magariño, I.; Lacuesta Gilabert, R.; Lloret, J. (2018). ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices. Wireless Communications and Mobile Computing. 2018:1-11. https://doi.org/10.1155/2018/7264269 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion https://doi.org/10.1155/2018/7264269 es_ES
dc.description.upvformatpinicio 1 es_ES
dc.description.upvformatpfin 11 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 2018 es_ES
dc.relation.pasarela S\376377 es_ES
dc.contributor.funder Gobierno de Aragón es_ES
dc.contributor.funder European Social Fund es_ES
dc.contributor.funder Universidad de Zaragoza es_ES
dc.contributor.funder Ministerio de Economía y Competitividad es_ES
dc.contributor.funder Ministerio de Educación, Cultura y Deporte es_ES
dc.contributor.funder Organismo Autónomo Programas Educativos Europeos es_ES
dc.description.references García-Magariño, I., Lacuesta, R., & Lloret, J. (2017). ABS-FishCount: An Agent-Based Simulator of Underwater Sensors for Measuring the Amount of Fish. Sensors, 17(11), 2606. doi:10.3390/s17112606 es_ES
dc.description.references Garcia-Magarino, I., Lacuesta, R., & Lloret, J. (2018). Agent-Based Simulation of Smart Beds With Internet-of-Things for Exploring Big Data Analytics. IEEE Access, 6, 366-379. doi:10.1109/access.2017.2764467 es_ES
dc.description.references Anagnostopoulos, T., Kolomvatsos, K., Anagnostopoulos, C., Zaslavsky, A., & Hadjiefthymiades, S. (2015). Assessing dynamic models for high priority waste collection in smart cities. Journal of Systems and Software, 110, 178-192. doi:10.1016/j.jss.2015.08.049 es_ES
dc.description.references Alomari, E., Manickam, S., B. Gupta, B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. International Journal of Computer Applications, 49(7), 24-32. doi:10.5120/7640-0724 es_ES
dc.description.references Anwar, Z., & Malik, A. W. (2014). Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies. IEEE Communications Letters, 18(7), 1175-1178. doi:10.1109/lcomm.2014.2328587 es_ES
dc.description.references Huda, S., Islam, R., Abawajy, J., Yearwood, J., Hassan, M. M., & Fortino, G. (2018). A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Generation Computer Systems, 83, 193-207. doi:10.1016/j.future.2017.12.037 es_ES
dc.description.references García-Magariño, I., Palacios-Navarro, G., & Lacuesta, R. (2017). TABSAOND: A technique for developing agent-based simulation apps and online tools with nondeterministic decisions. Simulation Modelling Practice and Theory, 77, 84-107. doi:10.1016/j.simpat.2017.05.006 es_ES
dc.description.references García-Magariño, I., Gómez-Rodríguez, A., González-Moreno, J. C., & Palacios-Navarro, G. (2015). PEABS: A Process for developing Efficient Agent-Based Simulators. Engineering Applications of Artificial Intelligence, 46, 104-112. doi:10.1016/j.engappai.2015.09.003 es_ES
dc.description.references Akhunzada, A., Sookhak, M., Anuar, N. B., Gani, A., Ahmed, E., Shiraz, M., … Khurram Khan, M. (2015). Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. Journal of Network and Computer Applications, 48, 44-57. doi:10.1016/j.jnca.2014.10.009 es_ES
dc.description.references Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622. doi:10.1109/comst.2015.2487361 es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem