A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology

The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without human intervention. However, the network may suffer from problems such as the low battery, heterogeneity, and connectivity issues due to the lack of standards. Even though these problems can cause several perfo...

Full description

Bibliographic Details
Main Authors: Zulfiqar Ali Khan, Akbar Siami Namin
Format: Article
Language:English
Published: MDPI AG 2022-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/23/3892
_version_ 1797463418340376576
author Zulfiqar Ali Khan
Akbar Siami Namin
author_facet Zulfiqar Ali Khan
Akbar Siami Namin
author_sort Zulfiqar Ali Khan
collection DOAJ
description The Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without human intervention. However, the network may suffer from problems such as the low battery, heterogeneity, and connectivity issues due to the lack of standards. Even though these problems can cause several performance hiccups, security issues need immediate attention because hackers access vital personal and financial information and then misuse it. These security issues can allow hackers to hijack IoT devices and then use them to establish a Botnet to launch a Distributed Denial of Service (DDoS) attack. Blockchain technology can provide security to IoT devices by providing secure authentication using public keys. Similarly, Smart Contracts (SCs) can improve the performance of the IoT–blockchain network through automation. However, surveyed work shows that the blockchain and SCs do not provide foolproof security; sometimes, attackers defeat these security mechanisms and initiate DDoS attacks. Thus, developers and security software engineers must be aware of different techniques to detect DDoS attacks. In this survey paper, we highlight different techniques to detect DDoS attacks. The novelty of our work is to classify the DDoS detection techniques according to blockchain technology. As a result, researchers can enhance their systems by using blockchain-based support for detecting threats. In addition, we provide general information about the studied systems and their workings. However, we cannot neglect the recent surveys. To that end, we compare the state-of-the-art DDoS surveys based on their data collection techniques and the discussed DDoS attacks on the IoT subsystems. The study of different IoT subsystems tells us that DDoS attacks also impact other computing systems, such as SCs, networking devices, and power grids. Hence, our work briefly describes DDoS attacks and their impacts on the above subsystems and IoT. For instance, due to DDoS attacks, the targeted computing systems suffer delays which cause tremendous financial and utility losses to the subscribers. Hence, we discuss the impacts of DDoS attacks in the context of associated systems. Finally, we discuss Machine-Learning algorithms, performance metrics, and the underlying technology of IoT systems so that the readers can grasp the detection techniques and the attack vectors. Moreover, associated systems such as Software-Defined Networking (SDN) and Field-Programmable Gate Arrays (FPGA) are a source of good security enhancement for IoT Networks. Thus, we include a detailed discussion of future development encompassing all major IoT subsystems.
first_indexed 2024-03-09T17:50:25Z
format Article
id doaj.art-79162f38458840a9bda8b5119607d043
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T17:50:25Z
publishDate 2022-11-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-79162f38458840a9bda8b5119607d0432023-11-24T10:47:18ZengMDPI AGElectronics2079-92922022-11-011123389210.3390/electronics11233892A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain TechnologyZulfiqar Ali Khan0Akbar Siami Namin1Department of Computer Science, Texas Tech University, P.O. Box 43104, Lubbock, TX 79409-3104, USADepartment of Computer Science, Texas Tech University, P.O. Box 43104, Lubbock, TX 79409-3104, USAThe Internet of Things (IoT) is a network of sensors that helps collect data 24/7 without human intervention. However, the network may suffer from problems such as the low battery, heterogeneity, and connectivity issues due to the lack of standards. Even though these problems can cause several performance hiccups, security issues need immediate attention because hackers access vital personal and financial information and then misuse it. These security issues can allow hackers to hijack IoT devices and then use them to establish a Botnet to launch a Distributed Denial of Service (DDoS) attack. Blockchain technology can provide security to IoT devices by providing secure authentication using public keys. Similarly, Smart Contracts (SCs) can improve the performance of the IoT–blockchain network through automation. However, surveyed work shows that the blockchain and SCs do not provide foolproof security; sometimes, attackers defeat these security mechanisms and initiate DDoS attacks. Thus, developers and security software engineers must be aware of different techniques to detect DDoS attacks. In this survey paper, we highlight different techniques to detect DDoS attacks. The novelty of our work is to classify the DDoS detection techniques according to blockchain technology. As a result, researchers can enhance their systems by using blockchain-based support for detecting threats. In addition, we provide general information about the studied systems and their workings. However, we cannot neglect the recent surveys. To that end, we compare the state-of-the-art DDoS surveys based on their data collection techniques and the discussed DDoS attacks on the IoT subsystems. The study of different IoT subsystems tells us that DDoS attacks also impact other computing systems, such as SCs, networking devices, and power grids. Hence, our work briefly describes DDoS attacks and their impacts on the above subsystems and IoT. For instance, due to DDoS attacks, the targeted computing systems suffer delays which cause tremendous financial and utility losses to the subscribers. Hence, we discuss the impacts of DDoS attacks in the context of associated systems. Finally, we discuss Machine-Learning algorithms, performance metrics, and the underlying technology of IoT systems so that the readers can grasp the detection techniques and the attack vectors. Moreover, associated systems such as Software-Defined Networking (SDN) and Field-Programmable Gate Arrays (FPGA) are a source of good security enhancement for IoT Networks. Thus, we include a detailed discussion of future development encompassing all major IoT subsystems.https://www.mdpi.com/2079-9292/11/23/3892vulnerabilitiesblockchainsmart contractsdetection techniquesmachine-learninginterplanetary file system (IPFS)
spellingShingle Zulfiqar Ali Khan
Akbar Siami Namin
A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
Electronics
vulnerabilities
blockchain
smart contracts
detection techniques
machine-learning
interplanetary file system (IPFS)
title A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
title_full A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
title_fullStr A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
title_full_unstemmed A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
title_short A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology
title_sort survey of ddos attack detection techniques for iot systems using blockchain technology
topic vulnerabilities
blockchain
smart contracts
detection techniques
machine-learning
interplanetary file system (IPFS)
url https://www.mdpi.com/2079-9292/11/23/3892
work_keys_str_mv AT zulfiqaralikhan asurveyofddosattackdetectiontechniquesforiotsystemsusingblockchaintechnology
AT akbarsiaminamin asurveyofddosattackdetectiontechniquesforiotsystemsusingblockchaintechnology
AT zulfiqaralikhan surveyofddosattackdetectiontechniquesforiotsystemsusingblockchaintechnology
AT akbarsiaminamin surveyofddosattackdetectiontechniquesforiotsystemsusingblockchaintechnology