Detection of DoS attacks using machine learning techniques

被引:1
作者
Kumar D. [1 ]
Kukreja V. [1 ]
Kadyan V. [2 ]
Mittal M. [3 ]
机构
[1] Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab
[2] Department of Informatics, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi Dehradun
[3] Department of Information Science, Kyoto Sangyo University, Kamigamo, Kyoto
来源
International Journal of Vehicle Autonomous Systems | 2020年 / 15卷 / 3-4期
关键词
IDS; Internet of things; Intrusion detection system; IoT; IoT challenges; IoT threats; Machine learning techniques;
D O I
10.1504/IJVAS.2020.116448
中图分类号
学科分类号
摘要
As the growth of IoT has been further reinforced by the advances, when used with other technologies like embedded systems, hardware and software enhancements, networking devices, but still there are so many threats in IoT that includes security, accuracy, performance, networks, and privacy. With the increased use of smart services, remote access, and frequent changes in networks has raised many security and privacy concerns. Therefore, security threats in IoT are one of the main issues while data transmission. Thus, network challenges and security issues concerning to IoT can be resolved by using machine learning (ML) techniques and algorithms. The current study outlined the security standards for IoT applications to enhance the performance and efficiency of the network and user services. As well as, the study focus is on comparing the Support Vector Machine (SVM) and Decision Trees for the detection of Denial of Service (DoS) attacks. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:256 / 270
页数:14
相关论文
共 27 条
[1]  
Agrawal S., Agrawal J., Survey on Anomaly Detection using Data Mining Techniques, Procedia Computer Science, 60, 6, pp. 708-713, (2015)
[2]  
Ahmad I., Iskandar B.S., Application of artificial neural network in detection of DoS attacks, Proceedings of the 2nd International Conference on Security of Information and Networks, pp. 229-234, (2009)
[3]  
Almseidin M., Alzubi M., Kovacs S., Alkasassbeh M., Evaluation of machine learning algorithms for intrusion detection system, IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 277-282, (2017)
[4]  
Amor N., Benferhat S., Cnrs C., Souvraz R.J., Naive Bayes vs decision trees in intrusion detection systems, Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420-424, (2004)
[5]  
Armentano R., Bhadoria R., Chatterjee P., Deka G., The Internet of Things: Foundation for Smart Cities, EHealth, and Ubiquitous Computing, (2017)
[6]  
Belavagi M.C., Muniyal B., Performance evaluation of supervised machine learning algorithms for intrusion detection, Procedia Computer Science, 89, 4, pp. 117-123, (2016)
[7]  
Bhadoria R.S., Chaudhari N.S., Pragmatic sensory data semantics with serviceoriented computing, Journal of Organizational and End User Computing, 31, 2, pp. 22-36, (2019)
[8]  
Borovcnik M., Bentz H.-J., Kapadia R., A probabilistic perspective, Chance Encounters: Probability in Education, (1991)
[9]  
Bul W., James A., Pannu M., Improving network intrusion detection system performance through quality of service configuration and parallel technology, Journal of Computer and System Sciences, 81, 6, pp. 981-999, (2015)
[10]  
Gharibian F., Ghorbani A.A., Comparative study of supervised machine learning techniques for intrusion detection, Fifth Annual Conference on Communication Networks and Services Research, pp. 350-358, (2007)