Skip to main content

Hybrid Classification Model Based on Supervised Techniques for Denial of Service Attacks Detection over CoAP Protocol

  • Conference paper
  • First Online:
Distributed Computing and Artificial Intelligence, Special Sessions II - Intelligent Systems Applications, 20th International Conference (DCAI 2023)

Abstract

The Internet of Things (IoT) systems rapidly expand and offer a wide range of services in diverse environments. However, due to the vast assortment of these systems, ensuring their security has become an increasingly significant challenge. The rise of malware such as Mirai or Dark Nexus clearly indicates the increasing number of attacks targeting IoT systems. Currently, the Constrained Application Protocol, known as CoAP, is one of the most commonly used protocols in the application layer of IoT networks. However, this protocol is vulnerable to Denial of Service (DoS) attacks. In this context, this research presents a hybrid system, based on supervised classification techniques, for detecting DoS attacks on IoT networks over CoAP protocol. For the validation of the system, a dataset including network traffic in an IoT network that has suffered DoS attacks has been used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisc. Rev. Comput. Stat. 2(4), 433–459 (2010)

    Article  Google Scholar 

  2. Aveleira-Mata, J., Iban-Sanchez, A., Teresa Garcia-Ordas, M., Garcia-Rodriguez, I., Alaiz-Moreton, H.: Review and replication of CoAP and MQTT attacks for dataset generation. In: INTELLIGENT ENVIRONMENTS 2020, vol. 28, pp. 207–216. IOS PRESS (2020). https://doi.org/10.3233/AISE200043

  3. Basurto, N., Arroyo, A., Cambra, C., Herrero, A.: A hybrid machine learning system to impute and classify a component-based robot. Logic J. IGPL 31(2), 338–351 (2022). https://doi.org/10.1093/jigpal/jzac023

  4. Correia, N., Sacramento, D., Schutz, G.: Dynamic aggregation and scheduling in CoAP/observe-based wireless sensor networks. IEEE Internet Things J. 3, 923–936 (2016). https://doi.org/10.1109/JIOT.2016.2517120

  5. Fernandez-Serantes, L., Casteleiro-Roca, J., Calvo-Rolle, J.: Hybrid intelligent system for a half-bridge converter control and soft switching ensurement. Revista Iberoamericana de Automática e Informática industrial (2022)

    Google Scholar 

  6. Gonzalez-Cava, J.M., et al.: Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery. Logic J. IGPL 29(2), 236–250 (2020). https://doi.org/10.1093/jigpal/jzaa049

  7. Granjal, J., Silva, J., Lourenço, N.: Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection. Sensors 18, 2445 (2018). https://doi.org/10.3390/s18082445

  8. Handa, A., Sharma, A., Shukla, S.K.: Machine learning in cybersecurity: a review. Wiley Interdisc. Rev. Data Min. Knowl. Discov. 9(4), e1306 (2019)

    Article  Google Scholar 

  9. Hosmer Jr., D.W., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 398. Wiley, Hoboken (2013)

    Google Scholar 

  10. Jolliffe, I.: Principal component analysis. Encyclopedia of Statistics in Behavioral Science (2005)

    Google Scholar 

  11. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Zayas-Gato, F., Vercelli, G., Calvo-Rolle, J.L.: A one-class classifier based on a hybrid topology to detect faults in power cells. Logic J. IGPL 30(4), 679–694 (2021). https://doi.org/10.1093/jigpal/jzab011

  12. Jove, E., et al.: Hybrid intelligent model to predict the remifentanil infusion rate in patients under general anesthesia. Logic J. IGPL 29(2), 193–206 (2020). https://doi.org/10.1093/jigpal/jzaa046

  13. Kotsiantis, S.B.: Decision trees: a recent overview. Artif. Intell. Rev. 39, 261–283 (2013)

    Article  Google Scholar 

  14. Kovatsch, M.: Github - mkovatsc/copper4cr: Copper (cu) CoAP user-agent for chrome (Javascript implementation) (2022). https://github.com/mkovatsc/Copper4Cr

  15. Leira, A., et al.: One-class-based intelligent classifier for detecting anomalous situations during the anesthetic process. Logic J. IGPL 30(2), 326–341 (2020). https://doi.org/10.1093/jigpal/jzaa065

  16. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 1125–1142 (2017). https://doi.org/10.1109/JIOT.2017.2683200

    Article  Google Scholar 

  17. Michelena, Á., et al.: A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport. Expert Syst. e13263 (2023)

    Google Scholar 

  18. Michelena, Á., Zayas-Gato, F., Jove, E., Calvo-Rolle, J.L.: Detection of dos attacks in an IoT environment with MQTT protocol based on intelligent binary classifiers. Eng. Proc. 7(1), 16 (2021)

    Google Scholar 

  19. Mucherino, A., Papajorgji, P.J., Pardalos, P.M., Mucherino, A., Papajorgji, P.J., Pardalos, P.M.: K-nearest neighbor classification. Data Min. Agric. 83–106 (2009)

    Google Scholar 

  20. lovelesh patel: Commits \(\cdot \) automote/esp-coap \(\cdot \) github (2021). https://github.com/automote/ESP-CoAP/commits?author=lovelesh

  21. Peng, C.Y.J., Lee, K.L., Ingersoll, G.M.: An introduction to logistic regression analysis and reporting. J. Educ. Res. 96(1), 3–14 (2002)

    Article  Google Scholar 

  22. Rizzardi, A., Sicari, S., Coen-Porisini, A.: Analysis on functionalities and security features of internet of things related protocols. Wirel. Netw. 28, 2857–2887 (2022). https://doi.org/10.1007/s11276-022-02999-7

  23. Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP) (2014). https://doi.org/10.17487/RFC7252, https://www.rfc-editor.org/info/rfc7252

  24. Simić, S., Banković, Z., Villar, J.R., Simić, D., Simić, S.D.: A hybrid fuzzy clustering approach for diagnosing primary headache disorder. Logic J. IGPL 29(2), 220–235 (2020). https://doi.org/10.1093/jigpal/jzaa048

  25. Simić, S., et al.: A three-stage hybrid clustering system for diagnosing children with primary headache disorder. Logic J. IGPL 31(2), 300–313 (2022). https://doi.org/10.1093/jigpal/jzac020

  26. Statista: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (2019). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

  27. Sutikno, T., Thalmann, D.: Insights on the internet of things: past, present, and future directions. TELKOMNIKA (Telecommun. Comput. Electron. Control) 20, 1399 (2022). https://doi.org/10.12928/telkomnika.v20i6.22028

  28. Thomas, D.R., Clayton, R., Beresford, A.R.: 1000 days of UDP amplification DDoS attacks. eCrime Researchers Summit, eCrime, pp. 79–84 (2017). https://doi.org/10.1109/ECRIME.2017.7945057

  29. Tukade, T.M., Banakar, R.: Data transfer protocols in IoT - an overview. Int. J. Pure Appl. Math 118(16), 121–138 (2018)

    Google Scholar 

  30. Whitmore, A., Agarwal, A., Da Xu, L.: The internet of things—a survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2014). https://doi.org/10.1007/s10796-014-9489-2

    Article  Google Scholar 

  31. Zayas-Gato, F., et al.: A novel method for anomaly detection using beta Hebbian learning and principal component analysis. Logic J. IGPL 31(2), 390–399 (2022). https://doi.org/10.1093/jigpal/jzac026

Download references

Acknowledgements

Álvaro Michelena’s research was supported by the Spanish Ministry of Universities (https://www.universidades.gob.es/), under the “Formación de Profesorado Universitario” grant with reference: FPU21/00932. Míriam Timiraos’s research was supported by the “Xunta de Galicia” (Regional Government of Galicia) through grants to industrial PhD (http://gain.xunta.gal/), under the “Doutoramento Industrial 2022” grant with reference: 04_IN606D_2022_ 2692965.

CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Álvaro Michelena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Michelena, Á. et al. (2023). Hybrid Classification Model Based on Supervised Techniques for Denial of Service Attacks Detection over CoAP Protocol. In: Jove, E., Zayas-Gato, F., Michelena, Á., Calvo-Rolle, J.L. (eds) Distributed Computing and Artificial Intelligence, Special Sessions II - Intelligent Systems Applications, 20th International Conference. DCAI 2023. Lecture Notes in Networks and Systems, vol 742. Springer, Cham. https://doi.org/10.1007/978-3-031-38616-9_1

Download citation

Publish with us

Policies and ethics