Loading

Detection and Defense of DDoS Attack for WSN
Prathyusha Reddy Y1, Manasa B2, Jyothi V3, Srikanth V4

1Prathyusha Reddy Y, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Guntur, India.
2Manasa B, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Guntur, India.
3Jyothi V, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Guntur, India.
4Srikanth V, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Guntur, India.
Manuscript received on 05 May 2019 | Revised Manuscript received on 12 May 2019 | Manuscript published on 30 May 2019 | PP: 969-974 | Volume-8 Issue-7, May 2019 | Retrieval Number: G5297058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of things (IoT) is being widely used in different areas. With the existence of smart and sensing devices at low cost adoption of Internet of Things (IoT) devices has been increased. So they are being used at homes, to predict environmental changes, hospitals, and many more. These IoT devices can be attacked in many ways which results in the great loss of security issues by performing attacks. One of the attacks is Distributed Denial of Service. The Distributed Denial of Services (DDoS) attack is done from a different number of systems which attack one target with large number of requests at a time. So the resources become unavailable to the users. This became our motivation to overcome the issue. To solve this kind of attacks we proposed a framework. In this paper we proposed how the IoT devices can be made secure from the DDoS attack using Wireless Sensor Networks (WSN). The defense mechanism is the one which detects and defense the DDoS attack. In this mechanism the malicious user continuously sends many number of requests to the target, making the resources unavailable to the users. So the wireless sensor detects the attack and defense the attack by using snort rules. 
Keyword: IoT, DDoS, Server, WSN, Malicious User, Attacks, Devices, Snort rules. 
Scope of the Article: IoT