Skip to main content

Abstract

Denial of Service (DoS) attack over Internet of Things (IoT) is among the most prevalent cyber threat, their complex behavior makes very expensive the use of Datagram Transport Layer Security (DTLS) for securing purposes. DoS attack exploits specific protocol features, causing disruptions and remaining undetected by legitimate components. This paper introduces a set of one-class boundary methods such as Approximate Convex Hull, K-Nearest Neighborhood and One-Class Support Vector Machine for developing a categorization model in order to prevent IoT DoS attacks over the CoAP (Constrained Application Protocol) environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Basurto, N., Arroyo, A., Cambra, C., Herrero, A.: A hybrid machine learning system to impute and classify a component-based robot. Logic J. IGPL 31(2), 338–351 (2022)

    Article  Google Scholar 

  2. Behal, A., Sandhu, J.K., Gupta, G.: Comparing http and coap for IOT low-power and lossy networks using the cooja simulator

    Google Scholar 

  3. Bradley, A.P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn. 30(7), 1145–1159 (1997)

    Article  Google Scholar 

  4. Chen, Y., Zhou, X. S., Huang, T.S.: One-class SVM for learning in image retrieval. In: ICIP (1) Citeseer, pp. 34–37 (2001)

    Google Scholar 

  5. Correia, N., Sacramento, D., Schutz, G.: Dynamic aggregation and scheduling in coap/observe-based wireless sensor networks. IEEE Internet of Things J. 3, 923–936 (2016)

    Article  Google Scholar 

  6. Fawcett, T.: An introduction to roc analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)

    Article  MathSciNet  Google Scholar 

  7. Fernández-Francos, D., Fontenla-Romero, ó., Alonso-Betanzos, A.: One-class convex hull-based algorithm for classification in distributed environments. IEEE Trans. Syst. Man Cybern. Syst. 1–11 (2018)

    Google Scholar 

  8. Fernandez-Serantes, L., Casteleiro-Roca, J., Calvo-Rolle, J.: Hybrid intelligent system for a half-bridge converter control and soft switching ensurement. Revista Iberoamericana de Automática e Informática industrial (2022)

    Google Scholar 

  9. Fernandez-Serantes, L.A., Casteleiro-Roca, J.-L., Berger, H., Calvo-Rolle, J.-L.: Hybrid intelligent system for a synchronous rectifier converter control and soft switching ensurement. Eng. Sci. Technol. Int. J. 35, 101189 (2022)

    Google Scholar 

  10. Gardner, A.B., Krieger, A.M., Vachtsevanos, G., Litt, B.: One-class novelty detection for seizure analysis from intracranial EEG. J. Mach. Learn. Res. 7, 1025–1044 (2006)

    MathSciNet  MATH  Google Scholar 

  11. Granjal, J., Silva, J.M., Lourenço, N.: Intrusion detection and prevention in COAP wireless sensor networks using anomaly detection. Sensors 18, 8 (2018)

    Article  Google Scholar 

  12. Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K.: KNN model-based approach in classification. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) OTM 2003. LNCS, vol. 2888, pp. 986–996. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39964-3_62

    Chapter  Google Scholar 

  13. Jove, E., et al.: Comparative study of one-class based anomaly detection techniques for a bicomponent mixing machine monitoring. Cybern. Syst. 51(7), 649–667 (2020)

    Article  Google Scholar 

  14. Jove, E., Casteleiro-Roca, J.-L., Quintián, H., Méndez-Pérez, J.-A., Calvo-Rolle, J.L.: A new method for anomaly detection based on non-convex boundaries with random two-dimensional projections. Inform. Fusion 65, 50–57 (2021)

    Article  Google Scholar 

  15. Jove, E., Casteleiro-Roca, J.-L., Quintián, H., Zayas-Gato, F., Vercelli, G., Calvo-Rolle, J.L.: A one-class classifier based on a hybrid topology to detect faults in power cells. Logic J. IGPL 30(4), 679–694 (2021)

    Article  Google Scholar 

  16. Khan, S.S., Madden, M.G.: One-class classification: taxonomy of study and review of techniques. Knowl. Eng. Rev. 29(3), 345–374 (2014)

    Article  Google Scholar 

  17. Kovatsch, M.: Github - mkovatsc/copper4cr: Copper (cu) coap user-agent for chrome (javascript implementation) (2022)

    Google Scholar 

  18. Patel, L.: Commits \(\cdot \) automote/esp-coap \(\cdot \) github (2021)

    Google Scholar 

  19. Mattsson, J.P., Fornehed, J., Selander, G., Palombini, F., Amsüss, C.: Attacks on the constrained application protocol (coap) (2022)

    Google Scholar 

  20. Naik, N.: Choice of effective messaging protocols for iot systems: Mqtt, coap, amqp and http. In: 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1–7 (2017)

    Google Scholar 

  21. Porras, S., Jove, E., Baruque, B., Calvo-Rolle, J.L.: A comparative analysis of intelligent techniques to predict energy generated by a small wind turbine from atmospheric variables. Logic J. IGPL (2022). jzac031

    Google Scholar 

  22. Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252 (June 2014)

    Google Scholar 

  23. Simić, S.: A three-stage hybrid clustering system for diagnosing children with primary headache disorder. Logic J. IGPL 31(2), 300–313 (2022)

    Article  Google Scholar 

  24. Simić, S., Simić, S.D., Banković, Z., Ivkov-Simić, M., Villar, J.R., Simić, D.: Deep convolutional neural networks on automatic classification for skin tumour images. Logic J. IGPL 30(4), 649–663 (2021)

    Article  Google Scholar 

  25. Suleymanov, E., Kirdan, E., Pahl, M.-O.: Securing coap with dtls and oscore, pp. 1–7. IEEE

    Google Scholar 

  26. Tax, D. M.J.: One-class classification: concept-learning in the absence of counter-examples [ph. d. thesis]. Delft University of Technology (2001)

    Google Scholar 

  27. Thomas, D.R., Clayton, R., Beresford, A.R.: 1000 days of UDP amplification DDOS attacks. eCrime Researchers Summit, eCrime, 79–84 (2017)

    Google Scholar 

  28. Zayas-Gato, F., et al.: A novel method for anomaly detection using beta Hebbian learning and principal component analysis. Logic J. IGPL 31(2), 390–399 (2022)

    Article  Google Scholar 

  29. Zeng, M., Yang, Y., Luo, S., Cheng, J.: One-class classification based on the convex hull for bearing fault detection. Mech. Syst. Signal Process. 81, 274–293 (2016)

    Article  Google Scholar 

  30. Zhang, S., Li, X., Zong, M., Zhu, X., Wang, R.: Efficient KNN classification with different numbers of nearest neighbors. IEEE Trans. Neural Netw. Learn. Syst. 29(5), 1774–1785 (2017)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

Álvaro Michelena’s research was supported by the Spanish Ministry of Universities (https://www.universidades.gob.es/), under the “Formación de Profesorado Universitario” grant with reference FPU21/00932.

Míriam Timiraos’s research was supported by the Xunta de Galicia (Regional Government of Galicia) through grants to industrial Ph.D. (http://gain.xunta.gal), under the Doutoramento Industrial 2022 grant with reference: \(04\_IN606D\_2022\_2692965\).

CITIC, as a Research Center of the University System of Galicia, is funded by Consellería de Educación, Universidade e Formación Profesional of the Xunta de Galicia through the European Regional Development Fund (ERDF) and the Secretaría Xeral de Universidades (Ref. ED431G 2019/01).

This work is partially supported by Universidad de León, under the “Programa Propio de Investigación de la Universidad de León 2021” grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Míriam Timiraos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Timiraos, M. et al. (2023). Categorization of CoAP DoS Attack Based on One-Class Boundary Methods. In: García Bringas, P., et al. 18th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2023). SOCO 2023. Lecture Notes in Networks and Systems, vol 749. Springer, Cham. https://doi.org/10.1007/978-3-031-42529-5_11

Download citation

Publish with us

Policies and ethics