Skip to main content

One-Class Reconstruction Methods for Categorizing DoS Attacks on CoAP

  • Conference paper
  • First Online:
Hybrid Artificial Intelligent Systems (HAIS 2023)

Abstract

Denial of Service (DoS) attack over Internet of Things (IoT) is among the most prevalent cyber threat, their complex behavior makes very expensive the use of Datagram Transport Layer Security (DTLS) for securing purposes. DoS attack exploits specific protocol features, causing disruptions and remaining undetected by legitimate components. This paper introduces a set of one-class reconstruction methods such as auto-encoder, K-Means and PCA (Principal Component Analysis) for developing a categorization model in order to prevent IoT DoS attacks over the CoAP (Constrained Application Protocol) environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Basurto, N., Arroyo, A., Cambra, C., Herrero, A.: A hybrid machine learning system to impute and classify a component-based robot. Log. J. IGPL 31(2), 338–351 (2022). https://doi.org/10.1093/jigpal/jzac023

    Article  Google Scholar 

  2. Bormann, C., Castellani, A.P., Shelby, Z.: CoAP: an application protocol for billions of tiny internet nodes. IEEE Internet Comput. 16(2), 62–67 (2012)

    Article  Google Scholar 

  3. Bradley, A.P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn. 30(7), 1145–1159 (1997)

    Article  Google Scholar 

  4. Caínzos López, V., et al.: Intelligent model for power cells state of charge forecasting in EV. Processes 10(7), 1406 (2022)

    Article  Google Scholar 

  5. Correia, N., Sacramento, D., Schutz, G.: Dynamic aggregation and scheduling in CoAP/observe-based wireless sensor networks. IEEE Internet Things J. 3, 923–936 (2016)

    Article  Google Scholar 

  6. Crespo Turrado, C., Sánchez Lasheras, F., Calvo-Rollé, J.L., Piñón-Pazos, A.J., de Cos Juez, F.J.: A new missing data imputation algorithm applied to electrical data loggers. Sensors 15(12), 31069–31082 (2015)

    Article  Google Scholar 

  7. Fawcett, T.: An introduction to roc analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)

    Article  MathSciNet  Google Scholar 

  8. Fernandes, B., Silva, F., Alaiz-Moreton, H., Novais, P., Neves, J., Analide, C.: Long short-term memory networks for traffic flow forecasting: exploring input variables, time frames and multi-step approaches. Informatica 31(4), 723–749 (2020)

    MathSciNet  MATH  Google Scholar 

  9. Fernandez-Serantes, L., Casteleiro-Roca, J., Calvo-Rolle, J.: Hybrid intelligent system for a half-bridge converter control and soft switching ensurement. Rev. Iberoamericana Autom. Inform. Industr. (2022)

    Google Scholar 

  10. Gonzalez-Cava, J.M., et al.: Machine learning techniques for computer-based decision systems in the operating theatre: application to analgesia delivery. Log. J. IGPL 29(2), 236–250 (2020). https://doi.org/10.1093/jigpal/jzaa049

    Article  MathSciNet  Google Scholar 

  11. Granjal, J., Silva, J.M., Lourenço, N.: Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection. Sensors 18(8) (2018). https://www.mdpi.com/1424-8220/18/8/2445

  12. Jove, E., et al.: Comparative study of one-class based anomaly detection techniques for a bicomponent mixing machine monitoring. Cybern. Syst. 51(7), 649–667 (2020)

    Google Scholar 

  13. Jove, E., Casteleiro-Roca, J.L., Quintián, H., Zayas-Gato, F., Vercelli, G., Calvo-Rolle, J.L.: A one-class classifier based on a hybrid topology to detect faults in power cells. Log. J. IGPL 30(4), 679–694 (2021). https://doi.org/10.1093/jigpal/jzab011

    Article  Google Scholar 

  14. Jove, E., et al.: Hybrid intelligent model to predict the remifentanil infusion rate in patients under general anesthesia. Log. J. IGPL 29(2), 193–206 (2021)

    Article  MathSciNet  Google Scholar 

  15. Khan, S.S., Madden, M.G.: One-class classification: taxonomy of study and review of techniques. Knowl. Eng. Rev. 29(3), 345–374 (2014)

    Article  Google Scholar 

  16. Kovatsch, M.: Github - mkovatsc/Copper4Cr: Copper (Cu) CoAP user-agent for chrome (javascript implementation) (2022). https://github.com/mkovatsc/Copper4Cr

  17. Mali, A., Nimkar, A.: Security schemes for constrained application protocol in IoT: a precise survey. In: Thampi, S.M., Martínez Pérez, G., Westphall, C.B., Hu, J., Fan, C.I., Gómez Mármol, F. (eds.) SSCC 2017. CCIS, vol. 746, pp. 134–145. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-6898-0_11

    Chapter  Google Scholar 

  18. Mattsson, J.P., Selander, G., Amsüss, C.: Amplification attacks using the constrained application protocol (CoAP). Internet-Draft draft-irtf-t2trg-amplification-attacks-02, Internet Engineering Task Force (2023). https://datatracker.ietf.org/doc/draft-irtf-t2trg-amplification-attacks/02/. Work in Progress

  19. lovelesh patel: Commits \(\cdot \) automote/esp-coap \(\cdot \) github (2021). https://github.com/automote/ESP-CoAP/commits?author=lovelesh

  20. Porras, S., Jove, E., Baruque, B., Calvo-Rolle, J.L.: A comparative analysis of intelligent techniques to predict energy generated by a small wind turbine from atmospheric variables. Log. J. IGPL 31, 648–663 (2022). https://doi.org/10.1093/jigpal/jzac031

    Article  MathSciNet  Google Scholar 

  21. Quintian Pardo, H., Calvo Rolle, J.L., Fontenla Romero, O.: Application of a low cost commercial robot in tasks of tracking of objects. Dyna 79(175), 24–33 (2012)

    Google Scholar 

  22. Radoglou Grammatikis, P.I., Sarigiannidis, P.G., Moscholios, I.D.: Securing the internet of things: challenges, threats and solutions. Internet Things 5, 41–70 (2019). https://www.sciencedirect.com/science/article/pii/S2542660518301161

  23. Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7 (2016)

    Google Scholar 

  24. Rodríguez, E., et al.: Transfer-learning-based intrusion detection framework in IoT networks. Sensors 22(15), 5621 (2022). https://dx.doi.org/10.3390/s22155621

  25. Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP). RFC 7252 (2014). https://www.rfc-editor.org/info/rfc7252

  26. Simić, S., et al.: A three-stage hybrid clustering system for diagnosing children with primary headache disorder. Log. J. IGPL 31(2), 300–313 (2022). https://doi.org/10.1093/jigpal/jzac020

    Article  Google Scholar 

  27. Simić, S., Simić, S.D., Banković, Z., Ivkov-Simić, M., Villar, J.R., Simić, D.: Deep convolutional neural networks on automatic classification for skin tumour images. Logic J. IGPL 30(4), 649–663 (2021). https://doi.org/10.1093/jigpal/jzab009

  28. Tax, D.M.J.: One-class classification: concept-learning in the absence of counter-examples [Ph. D. thesis]. Delft University of Technology (2001)

    Google Scholar 

  29. Thomas, D.R., Clayton, R., Beresford, A.R.: 1000 days of UDP amplification DDoS attacks. eCrime researchers Summit, eCrime, pp. 79–84 (2017)

    Google Scholar 

  30. Zayas-Gato, F., et al.: Intelligent model for active power prediction of a small wind turbine. Log. J. IGPL 31, 785–803 (2022). https://doi.org/10.1093/jigpal/jzac040

    Article  MathSciNet  Google Scholar 

  31. Zayas-Gato, F., et al.: A novel method for anomaly detection using beta Hebbian learning and principal component analysis. Log. J. IGPL 31(2), 390–399 (2022). https://doi.org/10.1093/jigpal/jzac026

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

Álvaro Michelena’s research was supported by the Spanish Ministry of Universities (https://www.universidades.gob.es/), under the “Formación de Profesorado Universitario” grant with reference FPU21/00932.

Míriam Timiraos’s research was supported by the Xunta de Galicia (Regional Government of Galicia) through grants to industrial Ph.D. (http://gain.xunta.gal), under the Doutoramento Industrial 2022 grant with reference: \(04_IN606D_2022_2692965\). CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Esteban Jove .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Michelena, Á. et al. (2023). One-Class Reconstruction Methods for Categorizing DoS Attacks on CoAP. In: García Bringas, P., et al. Hybrid Artificial Intelligent Systems. HAIS 2023. Lecture Notes in Computer Science(), vol 14001. Springer, Cham. https://doi.org/10.1007/978-3-031-40725-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-40725-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-40724-6

  • Online ISBN: 978-3-031-40725-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics