A Machine Learning Architecture Towards Detecting Denial of Service Attack in IoT

被引:2
作者
Al-Hadhrami, Yahya [1 ]
Hussain, Farookh Khadeer [1 ]
机构
[1] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
来源
COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019) | 2020年 / 993卷
关键词
IoT; Security; Machine learning; INTERNET; THINGS; CHALLENGES;
D O I
10.1007/978-3-030-22354-0_37
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of thing is part of our everyday life nowadays. Where millions of devices contented to the internet to collect and share data. Although IoT devices are evolving quickly to the consumer market where smart devices and sensors are becoming one of the main components of many households, IoT sensors and actuators have been also heavily used in the industry where thousands of devices are used to collect and share data for different purposes. With the rapid development of the Internet of Things in different areas, IoT is facing difficulty in securing overall availability of the network due to its heterogeneous nature. There are many types of vulnerability in IoT that can be mitigated with further research, however, in this paper, we have concentrated on distributed denial of Service attack (DDoS) on IoT. In this paper, we propose a machine learning architecture to detect DDoS attacks in IoT networks. The architecture collects IoT network traffic and analyzes the traffic through passing to machine learning model for attack detection. We propose the use of real-time data collection tool to dynamically monitor the network.
引用
收藏
页码:417 / 429
页数:13
相关论文
共 17 条
[1]   Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks [J].
Abomhara, Mohamed ;
Køien, Geir M. .
Journal of Cyber Security and Mobility, 2015, 4 (01) :65-88
[2]  
Cervantes C, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P606, DOI 10.1109/INM.2015.7140344
[3]   Internet of Things security and forensics: Challenges and opportunities [J].
Conti, Mauro ;
Dehghantanha, Ali ;
Franke, Katrin ;
Watson, Steve .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :544-546
[4]   A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks [J].
Gunduz, Sedef ;
Arslan, Bilgehan ;
Demirci, Mehmet .
2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, :150-155
[5]   Detecting selective forwarding attacks in Wireless Sensor Networks using Support Vector Machines [J].
Kaplantzis, Sophia ;
Shilton, Alistair ;
Mani, Nallasamy ;
Sekercioglu, Y. Ahmet .
PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, :335-+
[6]  
Kasinathan P, 2013, IEEE CONF WIREL MOB, P600, DOI 10.1109/WiMOB.2013.6673419
[7]  
Kurosawa S., 2007, International Journal of Network Security, P338
[8]   A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology [J].
Le, Anhtuan ;
Loo, Jonathan ;
Chai, Kok Keong ;
Aiash, Mahdi .
INFORMATION, 2016, 7 (02)
[9]   The Internet of Things (IoT): Applications, investments, and challenges for enterprises [J].
Lee, In ;
Lee, Kyoochun .
BUSINESS HORIZONS, 2015, 58 (04) :431-440
[10]  
Mahmoud R, 2015, INT CONF INTERNET, P336, DOI 10.1109/ICITST.2015.7412116