SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks | Wireless Personal Communications Skip to main content

Advertisement

Log in

SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things is one of the most versatile technologies in existence today. It has taken over our day to day activities and thus has many applications that are designed to make life easier and simpler. Partly because IoT is new, it is replete with insecurities and vulnerabilities. Due to the lack of fundamental security controls, and the integration of real-world objects with the Internet, IoT devices are facile targets for cyber-criminals and other aggressors. This means that these vulnerabilities can be exploited for hacking, adding to Botnets, and then used to launch DoS and DDoS against organizations. To provide security from DoS and DDoS attacks, various solutions have been proposed. In this paper, Machine Learning, as well as Deep Learning algorithms, have been employed to analyze the DoS and DDoS attacks. The Bot-IoT dataset of the Centre of UNSW Canberra Cyber was used for training purposes. ARGUS software was used to generate the features from the pcap files of UNSW. A testbed was setup using 20 devices and generated dataset. From the result, the best accuracy of attack classification is 99.5% and 99.9% for Deep Learning and Machine Learning algorithms respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Balaji, S., Nathani, K., & Santhakumar, R. (2019). IoT technology, applications and challenges: A contemporary survey. Wireless Personal Communications, 108(1), 363–388.

    Article  Google Scholar 

  2. Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.

    Article  Google Scholar 

  3. Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325–344.

    Article  Google Scholar 

  4. Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287–2310.

    Article  Google Scholar 

  5. Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, 779–796.

    Article  Google Scholar 

  6. Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine learning ddos detection for consumer internet of things devices. IEEE Security and Privacy Workshops (SPW). IEEE.

  7. Bhatt, P., & Morais, A. HADS: Hybrid anomaly detection system for IoT environments. In 2018 international conference on internet of things, embedded systems and communications (IINTEC) (pp. 191-196). IEEE.

  8. Peraković, D., Periša, M., Cvitić, I., & Husnjak, S. Artificial neuron network implementation in detection and classification of DDoS traffic. In 2016 24th Telecommunications Forum (TELFOR) (pp. 1-4). IEEE.

  9. Tama, B., & Rhee, K. (2017). Attack classification analysis of IoT network via deep learning approach. Research Briefs on Information & Communication Technology Evolution: ReBICTE, 3, 1–9.

    Google Scholar 

  10. McDermott, C. D., Majdani, F., & Petrovski, A. V. Botnet detection in the internet of things using deep learning approaches. In 2018 international joint conference on neural networks (IJCNN) (pp. 1-8). IEEE.

  11. Rahal, R., Korba, A., & Ghoualmi-Zine, N. (2020). Towards the development of realistic DoS dataset for intelligent transportation systems. Wireless Personal Communications, 115, 1415–1444.

    Article  Google Scholar 

  12. Kumar, U., Navaneet, S., Kumar, N., & Chandra Pandey, S. Isolation of ddos attack in iot: A new perspective. Wireless Personal Communications, 114, 2493–2510.

  13. De Donno, M., Dragoni, N., Giaretta, A., & Spognardi, A. (2018). DDoS-capable IoT malwares: Comparative analysis and Mirai investigation. Security and Communication Networks, 2018, 1–31.

  14. Yusof, A., Udzir, N., & Selamat, A. (2016). An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack. Cham: Springer.

    Book  Google Scholar 

  15. Lakshminarasimman, S., Ruswin, S., & Sundarakantham, K. Detecting DDoS attacks using decision tree algorithm. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) (pp. 1-6). IEEE.

  16. Fouladi, R. F., Eren Kayatas, C., & Anarim, E. Frequency based DDoS attack detection approach using naive Bayes classification. In 2016 39th International Conference on Telecommunications and Signal Processing (TSP) (pp. 104-107). IEEE.

  17. Ouyang, Z., Sun, X., Chen, J., Yue, D., & Zhang, T. (2018). Multi-view stacking ensemble for power consumption anomaly detection in the context of industrial internet of things. IEEE Access, 6, 9623–9631.

    Article  Google Scholar 

  18. Blanco, R., Malagon, P., Cilla, J., & Moya, J. (2018). Multiclass network attack classifier using cnn tuned with genetic algorithms. In Optimization and simulation (PATMOS). IEEE.

  19. Manaswi, N. (2018). Understanding and working with Keras. Deep learning with applications using python (pp. 31–43). Berkeley, CA: Apress.

    Book  Google Scholar 

  20. Farsad, N., & Goldsmith, A. (2017). Detection algorithms for communication systems using deep learning. arXiv:1705.08044.

  21. Jagannath, J., Polosky, N., Jagannath, A., Restuccia, F., & Melodia, T. (2019). Machine learning for wireless communications in the Internet of Things: A comprehensive survey. Ad Hoc Networks, 93, 101913.

    Article  Google Scholar 

  22. Chu, X., Ilyas, I. F., Krishnan, S., & Wang, J. (2016). Data cleaning: Overview and emerging challenges. In Proceedings of the 2016 international conference on management of data (pp. 2201-2206).

  23. Yavuz, F., Ünal, D., & Gül, E. (2018). Deep learning for detection of routing attacks in the internet of things. International Journal of Computational Intelligence Systems, 12(1), 39–58.

    Article  Google Scholar 

  24. Agostinelli, F., Hoffman M., Sadowski, P., & Baldi, P. (2014). Learning activation functions to improve deep neural networks. arXiv:1412.6830.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venkanna Uduthalapally.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, P., Bagga, H., Netam, B.S. et al. SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks. Wireless Pers Commun 122, 87–108 (2022). https://doi.org/10.1007/s11277-021-08890-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08890-6

Keywords

Navigation