<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>12</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2026</year>
	<month>3</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>ارزیابی حملات DDoS با استفاده از پروتکل‌های ارتباطی IoT</title_fa>
	<title>Assessment of DDoS Attacks Using IoT Communication Protocols</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>پژوهشی</content_type_fa>
	<content_type> Research Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;با گسترش روزافزون اینترنت اشیاء و وابستگی فزاینده به دستگاه&#8204;های متصل، امنیت سایبری به یکی از چالش&#8204;های اصلی این حوزه بدل شده است. حملات انکار سرویس توزیع&#8204;شده، با سوءاستفاده از آسیب&#8204;پذیری&#8204;های پروتکل&#8204;های ارتباطی، می&#8204;توانند دسترسی کاربران مجاز را مختل کرده و عملکرد سامانه&#8204;ها را تحت تأثیر قرار دهند. این پژوهش عملکرد سه پروتکل رایج HTTP، MQTT و CoAP را در بستر اینترنت اشیاء، تحت سناریوهای مختلف حملات انکار سرویس توزیع&#8204;شده بررسی و مقایسه می&#8204;کند. شاخص&#8204;های ارزیابی شامل زمان اشباع سیستم، مصرف پردازنده و حافظه است. نتایج نشان می&#8204;دهند که MQTT در سطح خدمات یک، بیشترین مصرف پردازنده و کمترین مقاومت در برابر اشباع دارد. &amp;nbsp;نتایج نشان می&#8204;دهند که MQTT در سطح QoS 1 بیشترین مصرف پردازنده و کمترین مقاومت در برابر اشباع دارد. HTTP نیز اگرچه در برخی سناریوها پایداری نسبی در مصرف منابع از خود نشان می&#8204;دهد، اما به دلیل سربار بالای حافظه و پردازش، در مقایسه با پروتکل&#8204;های سبک&#8204;وزن مانند CoAP و MQTT (QoS 0) آسیب&#8204;پذیرتر ارزیابی می&#8204;شود.&lt;/div&gt;</abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;In this study, the performance of three widely used communication protocols in the Internet of Things (IoT), namely HTTP, MQTT, and CoAP, is investigated and compared under Distributed Denial-of-Service (DDoS) attacks. The primary focus of the research is to evaluate system resource consumption and performance stability of these protocols under attack conditions. Key evaluation metrics include CPU usage, RAM usage, and the time required for the system to reach a saturation state. The objective of this study is to provide an empirical analysis of protocol behavior in attack scenarios and to establish a basis for selecting appropriate communication protocols for IoT applications.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;The experiments were conducted in a controlled environment over a local area network. The network topology consisted of a central router, three attacker nodes, and one target system. DDoS attacks were simulated by generating a high volume of packets or requests directed at the target system. Malicious traffic was produced using Python-based scripts, with packet transmission rates adjusted across different ranges to evaluate varying attack intensities. Wireshark was employed for network monitoring and traffic analysis, while operating system monitoring tools were used to measure system resource consumption.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;In this research, the MQTT protocol was evaluated under different Quality of Service (QoS) levels, including QoS 0, QoS 1, and QoS 2. In UDP-based scenarios, the performance of CoAP was compared with MQTT (QoS 0), whereas in TCP-based scenarios, &lt;strong&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;HTTP was analyzed alongside MQTT (QoS 1 and QoS 2).&lt;/span&gt;&lt;/strong&gt; System saturation was defined as an abnormal and sudden increase or decrease in CPU or memory usage relative to the initial steady-state condition, and the time at which this condition occurred was used as an indicator of protocol resilience.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;The CPU usage results indicate that in UDP-based scenarios, CoAP exhibits relatively higher CPU consumption compared to MQTT (QoS 0), while generally maintaining stable performance. In contrast, MQTT (QoS 0) experiences severe performance degradation after a short period in many scenarios, leading to the cessation of request processing. In TCP-based scenarios, HTTP demonstrates more uniform CPU usage compared to MQTT (QoS 1 and QoS 2), whereas MQTT, particularly at QoS 1, shows the highest CPU consumption and the lowest resistance to system saturation.&lt;span lang=&quot;AR-SA&quot; dir=&quot;RTL&quot; style=&quot;font-family:&quot;Arial&quot;,sans-serif&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Memory consumption analysis also reveals significant differences among the protocols. In UDP-based scenarios, CoAP maintains stable RAM usage over time, with no significant fluctuations observed even under attack conditions. Conversely, MQTT (QoS 0) experiences a sharp decline in memory usage after a certain period, indicating system instability during saturation. In TCP-based scenarios, HTTP maintains relatively stable memory usage in most experiments, with occasional drops, &lt;strong&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;while MQTT (QoS 1 and QoS 2) encounters sudden drops in RAM usage in the majority of scenarios.&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;The analysis of saturation time shows that in UDP-based scenarios with low message sizes, both CoAP and MQTT (QoS 0) exhibit similar stability durations. However, as message size increases, differences in behavior become evident. In some scenarios, MQTT (QoS 0) reaches saturation later than CoAP, while CoAP experiences performance degradation more rapidly. In TCP-based scenarios, HTTP demonstrates longer stability for small message sizes, but its saturation time decreases as message size increases.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Overall, the results of this study indicate that the selection of communication protocols in Internet of Things (IoT) systems has a direct impact on resource consumption and system resilience against DDoS attacks. Lightweight protocols such as CoAP and MQTT (QoS 0) demonstrate better performance in terms of resource usage and the time required to reach saturation. The HTTP protocol also exhibits relatively uniform resource consumption in certain scenarios; however, due to its higher processing and memory overhead compared to lightweight protocols, it shows limitations in overall resilience against DDoS attacks. In contrast, the use of higher QoS levels in MQTT leads to increased resource consumption and reduced system stability. These findings can serve as a practical reference for informed protocol selection in the design of IoT systems.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract>
	<keyword_fa>اینترنت اشیاء, حملات انکار سرویس توزیع‌شده, امنیت سایبری, پروتکل‌های ارتباطی, پروتکل‌های HTTP, MQTT و CoAP</keyword_fa>
	<keyword>Internet of Things, Distributed Denial of Service attacks, Cybersecurity, Communication protocols, HTTP, CoAP, MQTT Protocols</keyword>
	<start_page>68</start_page>
	<end_page>81</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-407-15&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Zahra</first_name>
	<middle_name></middle_name>
	<last_name>Bastani</last_name>
	<suffix></suffix>
	<first_name_fa>زهرا</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>باستانی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>zhr.bst@iasbs.ac.ir</email>
	<code>10031947532846002160</code>
	<orcid>10031947532846002160</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Faculty of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, Iran</affiliation>
	<affiliation_fa>دانشکده علوم رایانه و فناوری اطلاعات، دانشگاه تحصیلات تکمیلی علوم پایه، زنجان، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Peyman</first_name>
	<middle_name></middle_name>
	<last_name>Pahlevani</last_name>
	<suffix></suffix>
	<first_name_fa>پیمان</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>پهلوانی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>pahlevani@iasbs.ac.ir</email>
	<code>10031947532846002161</code>
	<orcid>10031947532846002161</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Faculty of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, Iran</affiliation>
	<affiliation_fa>دانشکده علوم رایانه و فناوری اطلاعات، دانشگاه تحصیلات تکمیلی علوم پایه، زنجان، ایران</affiliation_fa>
	 </author>


	<author>
	<first_name>Abolfazl</first_name>
	<middle_name></middle_name>
	<last_name>Mortezapour</last_name>
	<suffix></suffix>
	<first_name_fa>ابوالفضل</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>مرتضی‌پور</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>Amtzpr@iasbs.ac.ir</email>
	<code>10031947532846002162</code>
	<orcid>10031947532846002162</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Faculty of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, Iran</affiliation>
	<affiliation_fa>دانشکده علوم رایانه و فناوری اطلاعات، دانشگاه تحصیلات تکمیلی علوم پایه، زنجان، ایران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
