2023
DOI: 10.3390/app13179937
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques

Sapna Sadhwani,
Baranidharan Manibalan,
Raja Muthalagu
et al.

Abstract: The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vulnerable to DDoS attacks and propagating malware. A DDoS attack detection model is crucial for attacks in various industries, ensuring the availability and reliability of their networks and systems. The model distinguishes between legitimate and malicious traff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The proposed protocol stands out for its exceptional efficiency, consuming minimal battery and memory resources. This makes it exceptionally suitable for constrained IoT devices [58], [59]. By employing the Hashed Message Authentication Code (HMAC) function, the protocol generates a hash using a shared secret.…”
Section: Resultsmentioning
confidence: 99%
“…The proposed protocol stands out for its exceptional efficiency, consuming minimal battery and memory resources. This makes it exceptionally suitable for constrained IoT devices [58], [59]. By employing the Hashed Message Authentication Code (HMAC) function, the protocol generates a hash using a shared secret.…”
Section: Resultsmentioning
confidence: 99%
“…The machine learning-based misbehavior detection system achieved a high detection accuracy of 98.4%. A similar lightweight IDS for IoT is provided by Sadhwani et al [52]. The proposed solution incorporates an LR-based classifier to make an IDS.…”
Section: Existing Logit Model-based Solutionsmentioning
confidence: 99%
“…No. Title Authors Summary Automotive Intrusion Detection System Using Machine Learning Techniques [26][27] The study proposes an automotive intrusion detection system based on SVM and evaluates its accuracy and performance. Enhancing Automotive Cybersecurity Using Support Vector Machine and Deep Learning [20], [21] The research explores the combination of SVM and deep learning techniques for automotive cybersecurity.…”
Section: Table 1 Summary Of Related Workmentioning
confidence: 99%