Atika Bansal

Work place: School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India

E-mail:

Website:

Research Interests: Computer systems and computational processes, Computational Learning Theory, Data Mining, Data Structures and Algorithms

Biography

Atika Gupta is pursuing Ph.D. degree in Computer Science and Engineering Department, Graphic Era Deemed to be University, Uttarakhand, India. She has received her MCA and BCA degree from Graphic Era Deemed to be University. Currently, she is working as an Assistant Professor in Graphic Era Hill University, Dehradun, Uttarakhand, India. Her area of research is Data Mining, and Machine learning.

Author Articles
Analysis and Detection of various DDoS attacks on Internet of Things Network

By Atika Bansal Divya Kapil Anupriya Sagar Agarwal Vishan Kumar Gupta

DOI: https://doi.org/10.5815/ijwmt.2022.03.02, Pub. Date: 8 Jun. 2022

Internet of Things is used for those devices, which are connected over a network, once the devices are connected to the internet they are known as smart devices. These devices share information and communicate with each other to influence our day to day lives. Due to the rise in these devices, security is compromised. Malware is malicious software that can damage the computer, server, or network intentionally. Malware can also exploit the confidentiality, integrity, availability (CIA) triad. Rather than the traditional malware, IoT malware can damage different internet connected devices such as routers, DVRs, CCTV, or many internets connected devices. The IoT devices are more vulnerable due to weak passwords, missing authentication schemes, backdoor entries, lack of high-security algorithms, and plug and play services. There is no widespread survey available about IoT malware in an efficiently organized manner, publicly. In this article, we have classified the IoT malware according to their release and provide on the basis of their functionalities, growth, revolution, and their detection mechanism. We perform DDoS attack on Raspberry PI to hamper the home automation system. We employ Wireshark to monitor network traffic and demonstrate the service unavailability.

[...] Read more.
Other Articles