B Tech
Status of Project
The rising multiplication of Web of Things (IoT) gadgets has prompted a flood in security concerns, especially with respect to Circulated Refusal of Administration (DDoS) assaults. An overview of the detection and prevention strategies used to stop DDoS attacks against IoT devices is provided in this report.The report starts by featuring the extraordinary weaknesses of IoT gadgets that make them alluring focuses for DDoS assaults. It investigates the various attack vectors that malicious actors use to take advantage of these vulnerabilities and significantly disrupt IoT infrastructure. We look at the negative effects that successful DDoS attacks have on IoT devices, highlighting the need for robust security measures. Following that, the report delves into a variety of methods for detecting DDoS attacks on IoT devices. It emphasizes the significance of anomaly detection, machine learning algorithms, and traffic analysis in determining the erratic traffic patterns associated with these attacks. The capability of cooperative protection components and publicly supporting strategies for continuous assault location and reaction is likewise investigated. In addition, proactive methods for preventing DDoS attacks on IoT devices are discussed. The report stresses the significance of carrying out powerful verification instruments, secure correspondence conventions, and customary firmware updates to moderate weaknesses and improve gadget security. It additionally researches the job of organization isolation, traffic sifting, and rate restricting strategies in lessening the effect of DDoS assaults on IoT organizations. The report also looks at new frameworks and technologies that help IoT devices be more resistant to DDoS attacks. It investigates the capability of blockchain innovation, edge processing, and man-made reasoning in bracing IoT network security. To effectively combat DDoS attacks on IoT devices, the report recommends a multilayered security strategy that includes detection, prevention, and response mechanisms. In order to guarantee the security and integrity of the expanding IoT ecosystem, it is emphasized that stakeholders in the industry, policymakers, and researchers collaborate.
Students Involved
CHANDRA PRAKASH (1900520310019) DIWAKAR (1900520310020) SAKSHI VERMA (1900520320045) KRISHNA KANT SINGH (1900520000029)
Final Submission Date