They can be seen in many forms and are defined as any attack that can undermine the network or systems' capacity to perform expected functions. Catherine Mulligan, in Internet of Things (Second Edition), 2019 6.3.1 Denial of Service (DoS) AttacksĭoS attacks are the most common and easiest to implement attacks on IoT systems. A numerical example is provided to demonstrate the feasibility of the proposed system.
A simple and typical scenario where the communication sequence is purely round-robin is considered and a bound of attack frequency and duration is calculated to ensure the stability of the distributed CPS. A static output feedback controller is designed to achieve the stability of a nominal distributed system. A classification of detection approaches against DDoS attacks is presented with the aim of giving deep insight into the DDoS problem.įollowing that, we examine the stabilization of distributed cyber-physical systems (CPSs) affected by denial-of-service (DoS) attacks. Researchers have introduced various defense mechanisms including attack prevention, traceback, reaction, detection, and characterization against DDoS attacks, but the number of these attacks increases every year, and the ideal solutions to this problem have eluded us so far. Distributed Denial-of-Service (DDoS) attacks are the intimidation trials on the Internet that deplete the network bandwidth.