Reference Hub4
Detecting DDoS Attacks in IoT Environment

Detecting DDoS Attacks in IoT Environment

Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine
Copyright: © 2021 |Volume: 15 |Issue: 2 |Pages: 36
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859871|DOI: 10.4018/IJISP.2021040108
Cite Article Cite Article

MLA

Labiod, Yasmine, et al. "Detecting DDoS Attacks in IoT Environment." IJISP vol.15, no.2 2021: pp.145-180. http://doi.org/10.4018/IJISP.2021040108

APA

Labiod, Y., Korba, A. A., & Ghoualmi-Zine, N. (2021). Detecting DDoS Attacks in IoT Environment. International Journal of Information Security and Privacy (IJISP), 15(2), 145-180. http://doi.org/10.4018/IJISP.2021040108

Chicago

Labiod, Yasmine, Abdelaziz Amara Korba, and Nacira Ghoualmi-Zine. "Detecting DDoS Attacks in IoT Environment," International Journal of Information Security and Privacy (IJISP) 15, no.2: 145-180. http://doi.org/10.4018/IJISP.2021040108

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the great potential of internet of things (IoT) infrastructure in different domains, cyber-attacks are also rising commensurately. Distributed denials of service (DDoS) attacks are one of the cyber security threats. This paper will focus on DDoS attacks by adding the design of an intrusion detection system (IDS) tailored to IoT systems. Moreover, machine learning techniques will be investigated to distinguish the data representing flows of network traffic, which include both normal and DDoS traffic. In addition, these techniques will be used to help make a refined detection model for identifying different types of DDoS attacks. Furthermore, the performance of machine learning-based proposed solution is validated using N-BaIoT dataset and compared through different evaluation metrics. The experimental results show that the proposed IDS not only detects DDoS attacks types but also has a high detection rate and low false positive rate, which argues the usefulness of the proposed approach in comparison with several existing DDoS attacks detection techniques.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.