4.7 Review

Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks

期刊

COMPUTER SCIENCE REVIEW
卷 40, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.cosrev.2021.100371

关键词

Cyber-Physical System; Internet of Things; IoT; Software-defined networks; SDN; Fog Computing; Distributed Denial of Service; DDoS; IoT-DDoS

向作者/读者索取更多资源

The widespread adoption of IoT, Software-defined Networks, and Cloud Computing has facilitated the development of Cyber-Physical Systems. Despite offering solutions to DDoS attacks, Software-defined Cyber-Physical Systems still face vulnerabilities and security risks. Integrating Fog Computing as an architectural layer can enhance the security of the system.
The wide dispersion of the Internet of Things (IoT), Software-defined Networks and Cloud Computing have given the wings to Cyber-Physical System adoption. The newfangled society relies so much on Cyber-Physical Systems, such as Smart Cities, Smart Agriculture, Medical Cyber System, that a dearth to any of the available services may lead to severe concerns. The IoT devices are unwittingly contributing to the denial of service attacks. Though the neoteric Software-defined Anything (SDx) paradigm has offered effective solution approaches to catastrophic IoT-based DDoS attacks, the novel designed solutions confront various vulnerabilities due to less secure IoT devices, high-volume real-time network traffic generated by the colossal amount of IoT devices, etc. In this paper, we present a comprehensive survey on vulnerability analysis of security solutions for Software-defined Cyber-Physical System. The paper delineates the architectural details of the Software-defined Cyber-Physical System and recommends amalgamation of Fog Computing as one of the architectural layers for overcoming a number of vulnerabilities. As contemporary technologies like IoT, Software-defined Networking and Cloud Computing are the soup ingredients of the Software-defined Cyber-Physical System, each of the individual components has been auscultated individually for security vulnerabilities with a focus on Distributed Denial of Service (DDoS and IoT-based DDoS) attacks. To anticipate the future recasting of the novel paradigm, we discuss the ongoing research and detailed vulnerability analysis with a focus on resiliency, performance, and scalability. Last but not least, we discuss the lessons learned and prospects to conclude. (C) 2021 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据