2019 SoutheastCon 2019
DOI: 10.1109/southeastcon42311.2019.9020468
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Machine Learning Based Detection on DDoS Attacks for IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(6 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…The experiments are based on applying multi-classification or multi-label using different machine learning algorithms. The accuracy rates (AC) of RFT, K-NN, J48, AdaBoost, and Bagging are 97.99%, 97.99%, 85.51%, 97.99%, and 91.416%, respectively [ 30 , 31 , 32 , 33 , 34 , 35 ]. According to the results, RFT, K-NN, and AdaBoost models show better results in terms of accuracy than others.…”
Section: Evaluation and Experimental Resultsmentioning
confidence: 99%
“…The experiments are based on applying multi-classification or multi-label using different machine learning algorithms. The accuracy rates (AC) of RFT, K-NN, J48, AdaBoost, and Bagging are 97.99%, 97.99%, 85.51%, 97.99%, and 91.416%, respectively [ 30 , 31 , 32 , 33 , 34 , 35 ]. According to the results, RFT, K-NN, and AdaBoost models show better results in terms of accuracy than others.…”
Section: Evaluation and Experimental Resultsmentioning
confidence: 99%
“…Malicious and benign IoT network traffic 15M biflows 20 [105], [118], [175], [178], [185], [186], [188] [80] KDDCup99 Classification 4000000 42 [110], [141], [152], [166], [169], [171] [82] ISCXIDS2012 7 days of network activity which includes normal and malicious traffic for intrusion detection 571,698 - [109], [110], [113], [117], [157] [83] CICDDoS 2019…”
Section: Machine Learning and Deep Learningmentioning
confidence: 99%
“…Based on new input data, these models serve as a source for future predictions [35]. Not only ML but also DL and AI, in general, are getting expanded rapidly in cybersecurity fields, especially in the early detection and prediction in different domains such as malware detection in references [33] to [180], DOD/ DDOS detection in [109] to [122], intrusion detection as in references [158] to [165], spam detection as in [167], and BOTNET detection in references [179] to [192]. More details are in Table 5 which overviews different kinds of detection systems in the IoT environment.…”
Section: And DL In Iot Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In a survey conducted by Wehbi et al [17], three strategies for detecting DDoS attacks using ML were identified. Each strategy employs a distinct method of integrating machine-learning techniques, including the use of IoT network behavior (Approach 1), software-defined network (SDN) architecture (Approach 2), and Apache Spark (Approach 3).…”
Section: Related Workmentioning
confidence: 99%