Smart City Gnosys

Smart city article details

Title Comparative Evaluation On Various Machine Learning Strategies Based On Identification Of Ddos Attacks In Iot Environment
ID_Doc 15037
Authors Abinaya M.; Prabakeran S.; Kalpana M.
Year 2023
Published 2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023
DOI http://dx.doi.org/10.1109/ICACCS57279.2023.10112877
Abstract IoT is a combination of networks that have the ability to collect and share the information through web. Though IoT is used in areas such as healthcare, smart cities, agriculture, industrial automation and home automation, it is also used in other fields. The challenges faced by the IoT devices are security, privacy, confidentiality, integrity, and technical complexity. In Distributed Denial of Service attacks, the attacker sends massive service request to the IoT device which cannot handle such high traffic, resulting in disruption of services to the end user. Modern types of DDOS attack are still more complex, and they are nearlyimpossible to identify or mitigate using classic intrusion detection systems and methods. In the last few years, Machine learning plays a significant role in identifying Distributed Denial of Service attacks effectively. We conducted a literature review on different types of DDoS attacks based on ML techniques. The model's performance is tested on several classifiers to choose the optimal classifier with high accuracy. We next go over each of the ML methods for IoT security in detail. The limitations and problems of current research are discussed. © 2023 IEEE.
Author Keywords Distributed Denial of Service; Intrusion Detection System; IoT Attacks; IoT Security; Machine learning; NSL KDD


Similar Articles


Id Similarity Authors Title Published
17576 View0.937Nirosha V.; Hemamalini V.Ddos Attack Detection System For Iot Enabled Smart City Applications With Correlation Analysis2024 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024 (2024)
11011 View0.937Binu P.K.; Kiran M.; Sreehari M.V.Attack And Anomaly Prediction In Iot Networks Using Machine Learning Approaches2021 4th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2021 (2021)
18314 View0.933Abdulla H.; Al-Raweshidy H.S.; Awad W.Denial Of Service Detection For Iot Networks Using Machine LearningInternational Conference on Agents and Artificial Intelligence, 3 (2023)
33934 View0.928Shukla P.; Krishna C.R.; Patil N.V.Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive ReviewJournal of Supercomputing, 80, 7 (2024)
19238 View0.909Thiruppathi K.; Jaidhar C.D.Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling TechniquesCommunications in Computer and Information Science, 2333 CCIS (2025)
33508 View0.904Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
295 View0.903Sadhwani S.; Mathur A.; Muthalagu R.; Pawar P.M.5G-Siid: An Intelligent Hybrid Ddos Intrusion Detector For 5G Iot NetworksInternational Journal of Machine Learning and Cybernetics, 16, 2 (2025)
17574 View0.901Ahmadi K.; Javidan R.Ddos Attack Detection In A Real Urban Iot Environment Using Federated Deep LearningProceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023 (2023)
35958 View0.899Lefoane M.; Ghafir I.; Kabir S.; Awan I.-U.Machine Learning For Botnet Detection: An Optimized Feature Selection ApproachACM International Conference Proceeding Series (2021)
47766 View0.898Plazas Olaya M.K.; Vergara Tejada J.A.; Aedo Cobo J.E.Securing Microservices-Based Iot Networks: Real-Time Anomaly Detection Using Machine LearningJournal of Computer Networks and Communications, 2024 (2024)