Abstract
Internet of Things is one of the most versatile technologies in existence today. It has taken over our day to day activities and thus has many applications that are designed to make life easier and simpler. Partly because IoT is new, it is replete with insecurities and vulnerabilities. Due to the lack of fundamental security controls, and the integration of real-world objects with the Internet, IoT devices are facile targets for cyber-criminals and other aggressors. This means that these vulnerabilities can be exploited for hacking, adding to Botnets, and then used to launch DoS and DDoS against organizations. To provide security from DoS and DDoS attacks, various solutions have been proposed. In this paper, Machine Learning, as well as Deep Learning algorithms, have been employed to analyze the DoS and DDoS attacks. The Bot-IoT dataset of the Centre of UNSW Canberra Cyber was used for training purposes. ARGUS software was used to generate the features from the pcap files of UNSW. A testbed was setup using 20 devices and generated dataset. From the result, the best accuracy of attack classification is 99.5% and 99.9% for Deep Learning and Machine Learning algorithms respectively.
Similar content being viewed by others
References
Balaji, S., Nathani, K., & Santhakumar, R. (2019). IoT technology, applications and challenges: A contemporary survey. Wireless Personal Communications, 108(1), 363–388.
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.
Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325–344.
Verma, A., & Ranga, V. (2020). Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications, 111(4), 2287–2310.
Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, 779–796.
Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine learning ddos detection for consumer internet of things devices. IEEE Security and Privacy Workshops (SPW). IEEE.
Bhatt, P., & Morais, A. HADS: Hybrid anomaly detection system for IoT environments. In 2018 international conference on internet of things, embedded systems and communications (IINTEC) (pp. 191-196). IEEE.
Peraković, D., Periša, M., Cvitić, I., & Husnjak, S. Artificial neuron network implementation in detection and classification of DDoS traffic. In 2016 24th Telecommunications Forum (TELFOR) (pp. 1-4). IEEE.
Tama, B., & Rhee, K. (2017). Attack classification analysis of IoT network via deep learning approach. Research Briefs on Information & Communication Technology Evolution: ReBICTE, 3, 1–9.
McDermott, C. D., Majdani, F., & Petrovski, A. V. Botnet detection in the internet of things using deep learning approaches. In 2018 international joint conference on neural networks (IJCNN) (pp. 1-8). IEEE.
Rahal, R., Korba, A., & Ghoualmi-Zine, N. (2020). Towards the development of realistic DoS dataset for intelligent transportation systems. Wireless Personal Communications, 115, 1415–1444.
Kumar, U., Navaneet, S., Kumar, N., & Chandra Pandey, S. Isolation of ddos attack in iot: A new perspective. Wireless Personal Communications, 114, 2493–2510.
De Donno, M., Dragoni, N., Giaretta, A., & Spognardi, A. (2018). DDoS-capable IoT malwares: Comparative analysis and Mirai investigation. Security and Communication Networks, 2018, 1–31.
Yusof, A., Udzir, N., & Selamat, A. (2016). An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack. Cham: Springer.
Lakshminarasimman, S., Ruswin, S., & Sundarakantham, K. Detecting DDoS attacks using decision tree algorithm. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) (pp. 1-6). IEEE.
Fouladi, R. F., Eren Kayatas, C., & Anarim, E. Frequency based DDoS attack detection approach using naive Bayes classification. In 2016 39th International Conference on Telecommunications and Signal Processing (TSP) (pp. 104-107). IEEE.
Ouyang, Z., Sun, X., Chen, J., Yue, D., & Zhang, T. (2018). Multi-view stacking ensemble for power consumption anomaly detection in the context of industrial internet of things. IEEE Access, 6, 9623–9631.
Blanco, R., Malagon, P., Cilla, J., & Moya, J. (2018). Multiclass network attack classifier using cnn tuned with genetic algorithms. In Optimization and simulation (PATMOS). IEEE.
Manaswi, N. (2018). Understanding and working with Keras. Deep learning with applications using python (pp. 31–43). Berkeley, CA: Apress.
Farsad, N., & Goldsmith, A. (2017). Detection algorithms for communication systems using deep learning. arXiv:1705.08044.
Jagannath, J., Polosky, N., Jagannath, A., Restuccia, F., & Melodia, T. (2019). Machine learning for wireless communications in the Internet of Things: A comprehensive survey. Ad Hoc Networks, 93, 101913.
Chu, X., Ilyas, I. F., Krishnan, S., & Wang, J. (2016). Data cleaning: Overview and emerging challenges. In Proceedings of the 2016 international conference on management of data (pp. 2201-2206).
Yavuz, F., Ünal, D., & Gül, E. (2018). Deep learning for detection of routing attacks in the internet of things. International Journal of Computational Intelligence Systems, 12(1), 39–58.
Agostinelli, F., Hoffman M., Sadowski, P., & Baldi, P. (2014). Learning activation functions to improve deep neural networks. arXiv:1412.6830.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Kumar, P., Bagga, H., Netam, B.S. et al. SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks. Wireless Pers Commun 122, 87–108 (2022). https://doi.org/10.1007/s11277-021-08890-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08890-6