2021
DOI: 10.1007/s11277-021-08890-6
|View full text |Cite
|
Sign up to set email alerts
|

SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Kumar et al [11] developed an artificial neural network algorithm with decision trees, random forest, KNN, and naive Bayes algorithms with the Bot-IOT dataset. Later, this algorithm was tested using trafic data from a testbed consisting of 20 IoT devices that had been established.…”
Section: Related Workmentioning
confidence: 99%
“…Kumar et al [11] developed an artificial neural network algorithm with decision trees, random forest, KNN, and naive Bayes algorithms with the Bot-IOT dataset. Later, this algorithm was tested using trafic data from a testbed consisting of 20 IoT devices that had been established.…”
Section: Related Workmentioning
confidence: 99%
“…As the pcap files are captured at the mirroring switch, they contain all traffic from the network. Researchers interested in evaluating machine learning (ML) or DL models to detect slow-rate DDoS attacks can use applications such as CICFlowMeter, Tshark, 11 NetMate, 12 or ARGUS [26] to capture network flows from these pcap files and train and evaluate their models.…”
Section: Sdn-slowrate-ddos Datasetmentioning
confidence: 99%
“…In order to guarantee security from DoS and DDoS attacks, a number of ideas have been put forth in this article. Algorithms for Deep Learning and Machine Learning have both been used to assess DoS and DDoS attacks [11]. For training, the UNSW Canberra Cyber Center's BOT-IOT dataset was utilized.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the evaluation that was presented, the DT and RF algorithms generated the best results, with accuracy results of 99% and 99%, respectively. [11] To guarantee security from DoS and DDoS attacks using ML and DL techniques.…”
Section: Cicddos2019 Knn Svm Nb Dt Rfmentioning
confidence: 99%