Securing the Internet of Things 2019
DOI: 10.4018/978-1-5225-9866-4.ch030
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things

Abstract: This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 72 publications
0
5
0
Order By: Relevance
“…The charging scheduling phase is then implemented by utilizing the hybrid algorithm known as Exponential HHO, a combination of HHO 51 and exponential weighted moving average (EWMA) algorithm. 52 The HHO algorithm is computationally more efficient compared with the other algorithms. HHO utilizes a series of search strategies and selects the best movement step.…”
Section: Proposed Scheduling Approach For Ev Chargingmentioning
confidence: 99%
See 3 more Smart Citations
“…The charging scheduling phase is then implemented by utilizing the hybrid algorithm known as Exponential HHO, a combination of HHO 51 and exponential weighted moving average (EWMA) algorithm. 52 The HHO algorithm is computationally more efficient compared with the other algorithms. HHO utilizes a series of search strategies and selects the best movement step.…”
Section: Proposed Scheduling Approach For Ev Chargingmentioning
confidence: 99%
“…The HHO algorithm is effective in handling search space complexities with local optimum solutions. On the other hand, EWMA 52 was utilized to determine small shifts in processing the target values. Considering the merits of both methods, the issues found in one method can be easily solved by other methods, which is the fundamental utilization of the proposed algorithm.…”
Section: Proposed Exponential Hho For Charging Schedulingmentioning
confidence: 99%
See 2 more Smart Citations
“…Machine learning has proven to be very important and effective in identifying and protecting against cyber-attacks [12][13][14][15][16], also specifically for DDOS attacks [17]. For example a 97.4% of identification success for real traffic data has been obtained by D'Angelo et al [18] using U-BRAIN [19].…”
Section: Introductionmentioning
confidence: 99%