loading page

Real Time Frustration of TCP_SYN Flooding Attack in IoT using SDN
  • Mahmood Mohammed M. Abdal,
  • Dhuha Basheer Abdullah
Mahmood Mohammed M. Abdal
University of Mosul Department of Computer Science

Corresponding Author:[email protected]

Author Profile
Dhuha Basheer Abdullah
University of Mosul Department of Computer Science
Author Profile

Abstract

The widespread use of Internet of Things technology has made it now a popular topic subject. It’s full with all kinds of devices that are all linked to the internet and to one other. The limited processing power, storage space, and energy supply of IoT devices impose severe limitations on their overall functionality. Because of these limitations, implementing effective security measures on such devices is challenging. This makes them simple targets for fraudsters who are looking for vulnerable areas to exploit. TCP_SYN flooding assault is an effort to interrupt regular service by flooding a server with a large number of SYN packets without completing the handshake. The new networking paradigm known as Software Defined Networking (SDN) separates the forwarding devices from the control actions. It’s supposed to make managing networks easier and pave the way for new developments. In this paper, SDN model was proposed to detect and prevent TCP_SYN flooding attack in IoT based on the traffic’s anomalous behavior in real time. It has the ability to swiftly identify and mitigate attacks within a two-second time. The CPU utilization remains stable at around 19.1% during the process of mitigating attacks by discarding all malicious packets, rather than redirecting them to the controller for examination. A bout 6487795 packets dropped through TCP_SYN attack.