IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v17y2025i10p432-d1756096.html
   My bibliography  Save this article

Minimal Overhead Modelling of Slow DoS Attack Detection for Resource-Constrained IoT Networks

Author

Listed:
  • Andy Reed

    (School of Computing and Communications, The Open University, Milton Keynes MK7 6AA, UK)

  • Laurence S. Dooley

    (School of Computing and Communications, The Open University, Milton Keynes MK7 6AA, UK)

  • Soraya Kouadri Mostefaoui

    (School of Computing and Communications, The Open University, Milton Keynes MK7 6AA, UK)

Abstract

The increasing deployment of internet of things(IoT) systems across critical domains has broadened the threat landscape, and being the catalyst for a variety of security concerns, including very stealthy slow denial of service (slow DoS) attacks. These exploit the hypertext transfer protocol’s (HTTP) application-layer protocol to either close down service requests or degrade responsiveness while closely mimicking legitimate traffic. Current available datasets fail to capture the more stealthy operational profiles of slow DoS attacks or account for the presence of genuine slow nodes (SN), which are devices experiencing high latency. These can significantly degrade detection accuracy since slow DoS attacks closely emulate SN. This paper addresses these problems by synthesising a realistic HTTP slow DoS dataset derived from a live IoT network, that incorporates both stealth-tuned slow DoS traffic and legitimate SN traffic, with the three main slow DoS variants of slow GET, slow Read, and slow POST being critically evaluated under these network conditions. A limited packet capture (LPC) strategy is adopted which focuses on just two metadata attributes, namely packet length ( l p ) and packet inter-arrival time ( Δ t ). Using a resource lightweight decision tree classifier, the proposed model achieves over 96% accuracy while incurring minimal computational overheads. Experimental results in a live IoT network reveal the negative classification impact of including SN traffic, thereby underscoring the importance of modelling stealthy attacks and SN latency in any slow DoS detection framework. Finally, a MPerf (Modelling Performance) is presented which quantifies and balances detection accuracy against processing costs to facilitate scalable deployment of low-cost detection models in resource-constrained IoT networks. This represents a practical solution to improving IoT resilience against stealthy slow DoS attacks whilst pragmatically balancing the resource-constraints of IoT nodes. By analysing the impact of SN on detection performance, a robust reliable model has been developed which can both measure and fine tune the accuracy-efficiency nexus.

Suggested Citation

  • Andy Reed & Laurence S. Dooley & Soraya Kouadri Mostefaoui, 2025. "Minimal Overhead Modelling of Slow DoS Attack Detection for Resource-Constrained IoT Networks," Future Internet, MDPI, vol. 17(10), pages 1-21, September.
  • Handle: RePEc:gam:jftint:v:17:y:2025:i:10:p:432-:d:1756096
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/17/10/432/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/17/10/432/
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:17:y:2025:i:10:p:432-:d:1756096. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.