A Survey DDoS Attack in IoT Cloud Platform

  • Josy Elsa Varghese*
  • , Vidya Rao
  • *Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

Abstract

The Internet of Things (IoT) and cloud computing are the key components in the industrial revolution. The IoT platform provides provisioning, administration, and automation of smart items inside a specific IoT architecture, enabling the goal of connecting physical objects to the Internet so they may collaborate, communicate, and act intelligently without the need for human involvement. On the other hand, cloud computing has brought consumer and business applications online, revitalizing IT services and saving businesses money by eliminating the need to build and maintain on-site IT infrastructure for data storage and application operations. The long-term cost-effectiveness of cloud-based solutions includes enhanced security, corporate data mobility, more employee cooperation, and more sophisticated disaster recovery plans. The majority of cyber physical systems are currently hosted on IoT cloud platforms due to their advantages. However, security issues of the platform have to be addressed. Distributed Denial of Service attacks (DDoS) are among the most common. This paper studies the importance of IoT cloud architecture, discusses the defensive measures against DDoS attacks, and suggests a high-level conceptual IoT architecture to defend DDoS attacks while addressing future research challenges.

Original languageEnglish
Pages (from-to)388-393
Number of pages6
JournalInternational Conference on Parallel, Distributed and Grid Computing, PDGC
Issue number2024
DOIs
Publication statusPublished - 2024
Event8th International Conference on Parallel, Distributed and Grid Computing, PDGC 2024 - Solan, India
Duration: 18-12-202420-12-2024

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems
  • Health Informatics

Fingerprint

Dive into the research topics of 'A Survey DDoS Attack in IoT Cloud Platform'. Together they form a unique fingerprint.

Cite this