Abstract
The Internet of Things (IoT) systems rapidly expand and offer a wide range of services in diverse environments. However, due to the vast assortment of these systems, ensuring their security has become an increasingly significant challenge. The rise of malware such as Mirai or Dark Nexus clearly indicates the increasing number of attacks targeting IoT systems. Currently, the Constrained Application Protocol, known as CoAP, is one of the most commonly used protocols in the application layer of IoT networks. However, this protocol is vulnerable to Denial of Service (DoS) attacks. In this context, this research presents a hybrid system, based on supervised classification techniques, for detecting DoS attacks on IoT networks over CoAP protocol. For the validation of the system, a dataset including network traffic in an IoT network that has suffered DoS attacks has been used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdisc. Rev. Comput. Stat. 2(4), 433–459 (2010)
Aveleira-Mata, J., Iban-Sanchez, A., Teresa Garcia-Ordas, M., Garcia-Rodriguez, I., Alaiz-Moreton, H.: Review and replication of CoAP and MQTT attacks for dataset generation. In: INTELLIGENT ENVIRONMENTS 2020, vol. 28, pp. 207–216. IOS PRESS (2020). https://doi.org/10.3233/AISE200043
Basurto, N., Arroyo, A., Cambra, C., Herrero, A.: A hybrid machine learning system to impute and classify a component-based robot. Logic J. IGPL 31(2), 338–351 (2022). https://doi.org/10.1093/jigpal/jzac023
Correia, N., Sacramento, D., Schutz, G.: Dynamic aggregation and scheduling in CoAP/observe-based wireless sensor networks. IEEE Internet Things J. 3, 923–936 (2016). https://doi.org/10.1109/JIOT.2016.2517120
Fernandez-Serantes, L., Casteleiro-Roca, J., Calvo-Rolle, J.: Hybrid intelligent system for a half-bridge converter control and soft switching ensurement. Revista Iberoamericana de Automática e Informática industrial (2022)
Gonzalez-Cava, J.M., et al.: Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery. Logic J. IGPL 29(2), 236–250 (2020). https://doi.org/10.1093/jigpal/jzaa049
Granjal, J., Silva, J., Lourenço, N.: Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection. Sensors 18, 2445 (2018). https://doi.org/10.3390/s18082445
Handa, A., Sharma, A., Shukla, S.K.: Machine learning in cybersecurity: a review. Wiley Interdisc. Rev. Data Min. Knowl. Discov. 9(4), e1306 (2019)
Hosmer Jr., D.W., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 398. Wiley, Hoboken (2013)
Jolliffe, I.: Principal component analysis. Encyclopedia of Statistics in Behavioral Science (2005)
Jove, E., Casteleiro-Roca, J.L., Quintián, H., Zayas-Gato, F., Vercelli, G., Calvo-Rolle, J.L.: A one-class classifier based on a hybrid topology to detect faults in power cells. Logic J. IGPL 30(4), 679–694 (2021). https://doi.org/10.1093/jigpal/jzab011
Jove, E., et al.: Hybrid intelligent model to predict the remifentanil infusion rate in patients under general anesthesia. Logic J. IGPL 29(2), 193–206 (2020). https://doi.org/10.1093/jigpal/jzaa046
Kotsiantis, S.B.: Decision trees: a recent overview. Artif. Intell. Rev. 39, 261–283 (2013)
Kovatsch, M.: Github - mkovatsc/copper4cr: Copper (cu) CoAP user-agent for chrome (Javascript implementation) (2022). https://github.com/mkovatsc/Copper4Cr
Leira, A., et al.: One-class-based intelligent classifier for detecting anomalous situations during the anesthetic process. Logic J. IGPL 30(2), 326–341 (2020). https://doi.org/10.1093/jigpal/jzaa065
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 1125–1142 (2017). https://doi.org/10.1109/JIOT.2017.2683200
Michelena, Á., et al.: A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport. Expert Syst. e13263 (2023)
Michelena, Á., Zayas-Gato, F., Jove, E., Calvo-Rolle, J.L.: Detection of dos attacks in an IoT environment with MQTT protocol based on intelligent binary classifiers. Eng. Proc. 7(1), 16 (2021)
Mucherino, A., Papajorgji, P.J., Pardalos, P.M., Mucherino, A., Papajorgji, P.J., Pardalos, P.M.: K-nearest neighbor classification. Data Min. Agric. 83–106 (2009)
lovelesh patel: Commits \(\cdot \) automote/esp-coap \(\cdot \) github (2021). https://github.com/automote/ESP-CoAP/commits?author=lovelesh
Peng, C.Y.J., Lee, K.L., Ingersoll, G.M.: An introduction to logistic regression analysis and reporting. J. Educ. Res. 96(1), 3–14 (2002)
Rizzardi, A., Sicari, S., Coen-Porisini, A.: Analysis on functionalities and security features of internet of things related protocols. Wirel. Netw. 28, 2857–2887 (2022). https://doi.org/10.1007/s11276-022-02999-7
Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP) (2014). https://doi.org/10.17487/RFC7252, https://www.rfc-editor.org/info/rfc7252
Simić, S., Banković, Z., Villar, J.R., Simić, D., Simić, S.D.: A hybrid fuzzy clustering approach for diagnosing primary headache disorder. Logic J. IGPL 29(2), 220–235 (2020). https://doi.org/10.1093/jigpal/jzaa048
Simić, S., et al.: A three-stage hybrid clustering system for diagnosing children with primary headache disorder. Logic J. IGPL 31(2), 300–313 (2022). https://doi.org/10.1093/jigpal/jzac020
Statista: Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (2019). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Sutikno, T., Thalmann, D.: Insights on the internet of things: past, present, and future directions. TELKOMNIKA (Telecommun. Comput. Electron. Control) 20, 1399 (2022). https://doi.org/10.12928/telkomnika.v20i6.22028
Thomas, D.R., Clayton, R., Beresford, A.R.: 1000 days of UDP amplification DDoS attacks. eCrime Researchers Summit, eCrime, pp. 79–84 (2017). https://doi.org/10.1109/ECRIME.2017.7945057
Tukade, T.M., Banakar, R.: Data transfer protocols in IoT - an overview. Int. J. Pure Appl. Math 118(16), 121–138 (2018)
Whitmore, A., Agarwal, A., Da Xu, L.: The internet of things—a survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2014). https://doi.org/10.1007/s10796-014-9489-2
Zayas-Gato, F., et al.: A novel method for anomaly detection using beta Hebbian learning and principal component analysis. Logic J. IGPL 31(2), 390–399 (2022). https://doi.org/10.1093/jigpal/jzac026
Acknowledgements
Álvaro Michelena’s research was supported by the Spanish Ministry of Universities (https://www.universidades.gob.es/), under the “Formación de Profesorado Universitario” grant with reference: FPU21/00932. Míriam Timiraos’s research was supported by the “Xunta de Galicia” (Regional Government of Galicia) through grants to industrial PhD (http://gain.xunta.gal/), under the “Doutoramento Industrial 2022” grant with reference: 04_IN606D_2022_ 2692965.
CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Michelena, Á. et al. (2023). Hybrid Classification Model Based on Supervised Techniques for Denial of Service Attacks Detection over CoAP Protocol. In: Jove, E., Zayas-Gato, F., Michelena, Á., Calvo-Rolle, J.L. (eds) Distributed Computing and Artificial Intelligence, Special Sessions II - Intelligent Systems Applications, 20th International Conference. DCAI 2023. Lecture Notes in Networks and Systems, vol 742. Springer, Cham. https://doi.org/10.1007/978-3-031-38616-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-38616-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-38615-2
Online ISBN: 978-3-031-38616-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)