2021
DOI: 10.31590/ejosat.1014917
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 11 publications
(3 reference statements)
0
6
0
Order By: Relevance
“…However, these studies have been limited in contribution because of the datasets used. Some of them (Al-Hadhrami & Hussain, 2020;Bhale, Dey, Biswas & Nandi, 2020;Cakir, Toklu & Yalcin, 2020;Cakir & Yalcin, 2021;Mbarek, Ge & Pitner, 2020;Sharma, Elmiligi, Gebali & Verma, 2019;Verma & Ranga, 2020;Yavuz, Ünal & Gül, 2018) use simulation data for developing their models but such data may not be very convenient to develop machine learning models especially in realistic attack scenarios because simulators simulate a certain behavior and the data generated by them may not be very realistic. Some other works (Mounica, Vijayasaraswathi & Vasavi, 2021;Rezvy, Luo, Petridis, Lasebae & Zebin, 2019), on the other hand, use outdated network datasets which consist of generic network attacks.…”
Section: Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…However, these studies have been limited in contribution because of the datasets used. Some of them (Al-Hadhrami & Hussain, 2020;Bhale, Dey, Biswas & Nandi, 2020;Cakir, Toklu & Yalcin, 2020;Cakir & Yalcin, 2021;Mbarek, Ge & Pitner, 2020;Sharma, Elmiligi, Gebali & Verma, 2019;Verma & Ranga, 2020;Yavuz, Ünal & Gül, 2018) use simulation data for developing their models but such data may not be very convenient to develop machine learning models especially in realistic attack scenarios because simulators simulate a certain behavior and the data generated by them may not be very realistic. Some other works (Mounica, Vijayasaraswathi & Vasavi, 2021;Rezvy, Luo, Petridis, Lasebae & Zebin, 2019), on the other hand, use outdated network datasets which consist of generic network attacks.…”
Section: Motivationmentioning
confidence: 99%
“…Therefore, they are not also suitable for developing IoT-specific intrusion detection systems and we aim to generate a dataset which consists of the traffic data collected from IoT devices in a real testbed in order to develop our models. (iii) Furthermore, the detection capabilities of the proposed models are restricted in the previous works (Cakir et al, 2020;Cakir & Yalcin, 2021;Ioannou & Vassiliou, 2020;Meidan, Bohadana, Mathov, Mirsky, Shabtai, Breitenbacher & Elovici, 2018;Mounica et al, 2021;Thamilarasu & Chawla, 2019;Yavuz et al, 2018) because they generally propose binary classifiers which classify each attack type against benign traffic separately in the form of anomaly detectors. This requires to develop separate models for different attack types so that such systems do not scale well.…”
Section: Motivationmentioning
confidence: 99%
See 3 more Smart Citations