Skip to main content

Modelling DDoS Attacks in IoT Networks Using Machine Learning

  • Conference paper
  • First Online:
Emerging Technologies for Developing Countries (AFRICATEK 2022)

Abstract

The Internet-of-Things (IoT) relies on the TCP protocol to transport data from a source to a destination. Making it vulnerable to DDoS using the TCP SYN attack on Cyber-Physical Systems (CPS). Thus, with a potential propagation to the different servers located in both fog and the cloud infrastructures of the CPS. This study compares the effectiveness of supervised, unsupervised, semi-supervised machine learning algorithms, as well as statistical models for detecting DDoS attacks in CPS-IoT.

The models considered are broadly grouped into three: (i) ML-based detection - Logistic Regression, K-Means, and Artificial Neural Networks with two variants based on traffic slicing. We also investigated the effectiveness of semi-supervised hybrid learning models, which used unsupervised K-Means to label the data, then fed the output to a supervised learning model for attack detection. (ii) Statistic-based detection - Exponentially Weighted Moving Average and Linear Discriminant Analysis. (Iii) Prediction ‘algorithms - LGR, Kernel Ridge Regression and Support Vector Regression. Results of simulations showed that the hybrid model was able to achieve 100% accuracy with near zero false positives for all the ML models, while traffic slicing traffic helped improved detection time; the statistical models performed comparatively poorly, while the prediction models were able to achieve over 94% attack prediction accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ajayi, O.O., Bagula, A.B., Maluleke, H.C., Odun-Ayo, I.A.: Transport inequalities and the adoption of intelligent transportation systems in Africa: a research landscape. Sustainability 13(22), 12891 (2021)

    Article  Google Scholar 

  2. Bagula, A., Mandava, M., Bagula, H.: A framework for healthcare support in the rural and low income areas of the developing world. J. Netw. Comput. Appl. 120, 17–29 (2018)

    Article  Google Scholar 

  3. Ismail, A., Bagula, B.A., Tuyishimire, E.: Internet-of-Things in motion: a UAV coalition model for remote sensing in smart cities. Sensors 18(7), 2184 (2018)

    Article  Google Scholar 

  4. Ma, K., Bagula, A., Nyirenda, C., Ajayi, O.: An IoT-based Fog computing model. Sensors 19(12), 2783 (2019)

    Article  Google Scholar 

  5. Zennaro, M., Bagula, A.: Design of a flexible and robust gateway to collect sensor data in intermittent power environments. Int. J. Sens. Netw. 8(3–4), 172–181 (2010)

    Article  Google Scholar 

  6. Bagula, A.B.: Hybrid traffic engineering: the least path interference algorithm. In: Proceedings of the SAICT 2004, ACM International Conference Proceedings Series, pp. 89–96 (2004). ISBN: 1-58113-982-9

    Google Scholar 

  7. Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Int. Things 14, 100365 (2021)

    Google Scholar 

  8. AMQP: CloudAMQP. https://www.cloudamqp.com/docs/amqp.html

  9. Pardo-Castellote, G.: Omg data-distribution service: architectural overview. In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 200–206 (2003)

    Google Scholar 

  10. Anonymous "MQTT FAQ." https://mqtt.org/faq/

  11. Millard, P., Saint-Andre, P., Meijer, R.: "No title," XEP-0060: Publish-Subscribe, XMPP Standards Foundation

    Google Scholar 

  12. Bagula, A., Ajayi, O., Maluleke, H.: Cyber physical systems dependability using CPS-IOT monitoring. Sensors 21(8), 2761 (2021)

    Google Scholar 

  13. Garber, L.: Denial-of-service attacks rip the Internet. Computer 33(04), 12–17 (2000)

    Article  Google Scholar 

  14. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  15. Khan, F.I., Hameed, S.: Understanding security requirements and challenges in internet of things (IoTs): a review. arXiv preprint arXiv:1808.10529

  16. Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput. Secur. 65, 344–372 (2017)

    Article  Google Scholar 

  17. Hosseini, S., Azizi, M.: The hybrid technique for DDoS detection with supervised learning algorithms. Comput. Netw. 158, 35–45 (2019)

    Article  Google Scholar 

  18. Wang, M., Lu, Y., Qin, J.: A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput. Secur. 88, 101645 (2020)

    Article  Google Scholar 

  19. Chaudhary, P., Gupta, B.B.: Ddos detection framework in resource constrained internet of things domain. In: Proceedings of IEEE Global Conference on Consumer Electronics (GCCE), pp. 675–678 (2019)

    Google Scholar 

  20. Wehbi, K., Hong, L., Al-salah, T., Bhutta, A.A.: A survey on machine learning based detection on DDoS attacks for IoT systems. In: Proceedings of the IEEE Southeastcon, pp. 1–6 (2019)

    Google Scholar 

  21. Polat, H., Polat, O., Cetin, A.: Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. MDPI Sustain. 12(3), 1035 (2020)

    Article  Google Scholar 

  22. Lichman, M.: DARPA intrusion detection evaluation dataset. DARPA Intrusion Detection Evaluation Dataset—MIT Lincoln Laboratory (2000)

    Google Scholar 

  23. Machaka, P., Bagula, A.: Statistical properties and modelling of DDoS attacks. In: Vinh, P.C., Rakib, A. (eds.) Context-Aware Systems and Applications, and Nature of Computation and Communication. ICCASA ICTCC 2020 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 343. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-67101-3_4

  24. Morissette, L., Chartier, S.: The k-means clustering technique: general considerations and implementation in Mathematica. Tutorials Quant. Methods Psychol. 9(1), 15–24 (2013)

    Article  Google Scholar 

  25. Roberts, S.W.: Control chart tests based on geometric moving averages. Technometrics 1(3), 239–250 (1959)

    Article  Google Scholar 

  26. Theodoridis, S.: Classification: a tour of the classics. In: Theodoridis, S., Ed. Machine Learning, pp. 275–325. Academic Press, London (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pheeha Machaka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Machaka, P., Ajayi, O., Kahenga, F., Bagula, A., Kyamakya, K. (2023). Modelling DDoS Attacks in IoT Networks Using Machine Learning. In: Masinde, M., Bagula, A. (eds) Emerging Technologies for Developing Countries. AFRICATEK 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 503. Springer, Cham. https://doi.org/10.1007/978-3-031-35883-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35883-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35882-1

  • Online ISBN: 978-3-031-35883-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics