Detection of DoS attacks using machine learning techniques

被引:6
|
作者
Kumar D. [1 ]
Kukreja V. [1 ]
Kadyan V. [2 ]
Mittal M. [3 ]
机构
[1] Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab
[2] Department of Informatics, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi Dehradun
[3] Department of Information Science, Kyoto Sangyo University, Kamigamo, Kyoto
来源
关键词
IDS; Internet of things; Intrusion detection system; IoT; IoT challenges; IoT threats; Machine learning techniques;
D O I
10.1504/IJVAS.2020.116448
中图分类号
学科分类号
摘要
As the growth of IoT has been further reinforced by the advances, when used with other technologies like embedded systems, hardware and software enhancements, networking devices, but still there are so many threats in IoT that includes security, accuracy, performance, networks, and privacy. With the increased use of smart services, remote access, and frequent changes in networks has raised many security and privacy concerns. Therefore, security threats in IoT are one of the main issues while data transmission. Thus, network challenges and security issues concerning to IoT can be resolved by using machine learning (ML) techniques and algorithms. The current study outlined the security standards for IoT applications to enhance the performance and efficiency of the network and user services. As well as, the study focus is on comparing the Support Vector Machine (SVM) and Decision Trees for the detection of Denial of Service (DoS) attacks. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:256 / 270
页数:14
相关论文
共 50 条
  • [1] IoT Attacks Detection Using Supervised Machine Learning Techniques
    Aljabri, Malak
    Shaahid, Afrah
    Alnasser, Fatima
    Saleh, Asalah
    Alomari, Dorieh
    Aboulnour, Menna
    Al-Eidarous, Walla
    Althubaity, Areej
    HighTech and Innovation Journal, 2024, 5 (03): : 534 - 550
  • [2] A Study on Detection of Malware Attacks Using Machine Learning Techniques
    Yang, Daojing
    International Journal of Network Security, 2023, 25 (06) : 1042 - 1047
  • [3] Web Application Attacks Detection Using Machine Learning Techniques
    Betarte, Gustavo
    Martinez, Rodrigo
    Pardo, Alvaro
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1065 - 1072
  • [4] UAV networks DoS attacks detection using artificial intelligence based on weighted machine learning
    Valikhanli, Orkhan
    RESULTS IN CONTROL AND OPTIMIZATION, 2024, 16
  • [5] ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review
    Tayyab, Mohammad
    Belaton, Bahari
    Anbar, Mohammed
    IEEE ACCESS, 2020, 8 : 170529 - 170547
  • [6] Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques
    Sudar, K. Muthamil
    Beulah, M.
    Deepalakshmi, P.
    Nagaraj, P.
    Chinnasamy, P.
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [7] Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
    Al-issa, Abdulaziz, I
    Al-Akhras, Mousa
    ALsahli, Mohammed S.
    Alawairdhi, Mohammed
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 107 - 112
  • [8] Cascaded Machine Learning Model Based DoS Attacks Detection and Classification in NoC
    Hu, Shengkai
    Wang, Haoyu
    Halak, Basel
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [9] A Paradigm for DoS Attack Disclosure using Machine Learning Techniques
    Abualhaj, Mosleh M.
    Abu-Shareha, Ahmad Adel
    Hiari, Mohammad O.
    Alrabanah, Yousef
    Al-Zyoud, Mahran
    Alsharaiah, Mohammad A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 192 - 200
  • [10] Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
    Bindra, Naveen
    Sood, Manu
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (05) : 419 - 428