Explore chapters and articles related to this topic
IoT Security Frameworks and Countermeasures
Published in Stavros Shiaeles, Nicholas Kolokotronis, Internet of Things, Threats, Landscape, and Countermeasures, 2021
G. Bendiab, B. Saridou, L. Barlow, N. Savage, S. Shiaeles
SYN flood is another form of DDoS attack that exploits the handshake process of a TCP connection by repeatedly sending SYN requests faster than the targeted system can process them, causing network saturation [19]. This kind of DDoS attacks is able to overwhelm all available ports on the target machine, making it unavailable to legitimate traffic. Attackers may also spoof their IP addresses on each SYN packet they send in order to avoid detection and make their identity more difficult to discover. Stateful packet inspection or SPI firewalls can easily stop SYN floods by examining all the packets from a given source. Thus, a large number of SYN packets from a single IP without corresponding SYN/ACK packets would be classified as abnormal and be blocked [19, 35]. Some advanced firewalls can block open and closed ports if a suspect IP address is probing them. These firewalls can also be configured to alert administrators if they detect connection requests across many ports from only one host [36].
Cyber Threats to Farming Automation
Published in Utku Kose, V. B. Surya Prasath, M. Rubaiyat Hossain Mondal, Prajoy Podder, Subrato Bharati, Artificial Intelligence and Smart Agriculture Technology, 2022
A flood attack is based upon a simplified notion where the attackers dispatch an enormous amount of requests that cannot be performed by a server of an organization. This continues until the server gets hooked and surrenders to the attack because it can regain functionality only after the attack is stopped (Laajalahti & Nikander, 2017). These attacks are frequent because execution is easy. There are different types of flood attacks, which include: Ping flooding: In this type of attack, the marked servers are gushed with ICMP echo request,s which results in increased utilization of bandwidth, which gradually stops or slow the server’s operations.SYN flood: In this type of attack, SYN requests are transmitted constantly by the attackers, which the marked server is ultimately bound to accept. The server generally crashes or slows down because these attacks involve the trading of acknowledgement and synchronization messages.Smurf attack: In this attack, ping messages are pinged to the broadcast IP addresses, and if there is a reply from the marked server or machine then the attack expands to a larger range of servers. This problem is less common due to improvements in modern routers.UDP attack: In this kind of attack, a large volume of UDP packets are transmitted to the marked servers, which in turn prevents authorized users from gaining access to the server.
Security and Privacy Issues in Fog Computing
Published in Ravi Tomar, Avita Katal, Susheela Dahiya, Niharika Singh, Tanupriya Choudhury, Fog Computing, 2023
Smriti Gaba, Susheela Dahiya, Keshav Kaushik
While considering a basic overview of fog computing being a link between cloud and edge device, it is observed that the security issues that apply to cloud computing could be inherited by the fog computing platform. These security threats may include: Denial-of-Service (DoS) attacks: Excessive requests are sent to the network making resources unavailable to legitimate users. For example, a SYN Flood attack where the attacker sends excessive SYN messages continuously and does not send ACK messages so that SYN requests floods the server as illustrated in Figure 6.1 and due to absence of ACK message, none of the requests gets terminated, resulting in a DoS attack.Access Control Issues: Access control issues allow an unauthorized user to gain access, acquire data and permissions to modify configurations.Insecure APIs: Insecure APIs that are provided to a third-party to give services to customers could lead to access of security keys, sensitive information, decryption of customer’s encrypted data and modification of parameters affecting endpoints.Account Hijacking: An attacker may steal account credentials via cross-site scripting (XSS) malicious payload attacks, phishing attacks, execution of buffer overflow by sending extra bytes of data in the username or password field, resulting in voiding the password and gaining complete access to the account.Shared Technology Vulnerabilities: Due to the absence of isolation between virtual machines, sharing of infrastructure, platform and software gives birth to many vulnerabilities increasing the potential attack surface for unauthorized access, privilege escalation, VM based attacks, weak segregation, etc.
An Efficient DDoS Attack Detection Using Chaos Henry Gas Solubility Optimization Weight Initialization Based Rectified Linear Unit
Published in Cybernetics and Systems, 2023
Selvam Lakshmanan, Uma Maheswari Gnaniyan Ponnusamy, Senthilkumar Andi
TCP SYN Flood Attack: TCP SYN flood is a type of DDoS that uses part of the normal TCP three-way handshakes to use up resources on the target server and render it unresponsive. To every port on the target server, the attacker sends repeated SYN packets. The server receives multiple legitimate requests to establish communication.