IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v15y2021i2p145-180.html
   My bibliography  Save this article

Detecting DDoS Attacks in IoT Environment

Author

Listed:
  • Yasmine Labiod

    (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Algeria)

  • Abdelaziz Amara Korba

    (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Algeria)

  • Nacira Ghoualmi-Zine

    (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Algeria)

Abstract

With the great potential of internet of things (IoT) infrastructure in different domains, cyber-attacks are also rising commensurately. Distributed denials of service (DDoS) attacks are one of the cyber security threats. This paper will focus on DDoS attacks by adding the design of an intrusion detection system (IDS) tailored to IoT systems. Moreover, machine learning techniques will be investigated to distinguish the data representing flows of network traffic, which include both normal and DDoS traffic. In addition, these techniques will be used to help make a refined detection model for identifying different types of DDoS attacks. Furthermore, the performance of machine learning-based proposed solution is validated using N-BaIoT dataset and compared through different evaluation metrics. The experimental results show that the proposed IDS not only detects DDoS attacks types but also has a high detection rate and low false positive rate, which argues the usefulness of the proposed approach in comparison with several existing DDoS attacks detection techniques.

Suggested Citation

  • Yasmine Labiod & Abdelaziz Amara Korba & Nacira Ghoualmi-Zine, 2021. "Detecting DDoS Attacks in IoT Environment," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 15(2), pages 145-180, April.
  • Handle: RePEc:igg:jisp00:v:15:y:2021:i:2:p:145-180
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2021040108
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:15:y:2021:i:2:p:145-180. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.