Security challenges in internet of things: Distributed denial of service attack detection using support vector machine‐based expert systems

  title={Security challenges in internet of things: Distributed denial of service attack detection using support vector machine‐based expert systems},
  author={Azath Mubarakali and Karthik Srinivasan and Reham Faya Mukhalid and Subash Chandra Bose Jaganathan and Ninoslav Marina},
  journal={Computational Intelligence},
  pages={1580 - 1592}
The rapid development of internet of things (IoT) is to be the next generation of the IoT devices are a simple target for attackers due to the lack of security. Attackers can easily hack the IoT devices that can be used to form botnets, which can be used to launch distributed denial of service (DDoS) attack against networks. Botnets are the most dangerous threat to the security systems. Software‐defined networking (SDN) is one of the developing filed, which introduce the capacity of dynamic… 
Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research
This study aimed to identify, assess and provide a thoroughly review of experimental works on the research relevant to the detection of IoT botnets, using a systematic literature review (SLR) method for gathering and critically reviewing research papers.
Deployment with Location Knowledge by Multi Area Approach
To stop the node replica attack in wireless sensor network, a location cluster detection scheme using deployment knowledge is proposed and from the implementation results the proposed model compared with Area based cluster approach (ABCD), Fingerprint based detection techniques.
Secure Data Transmission on Internet of Healthcare Things
This work presented healthcare service providers for giving the full scope of medical services to people enrolled in IoHT and presented Secure Data, showing that Secure Data can be efficient while applying for ensuring security chances in IoT-based healthcare systems.
SQL and Data Inference Injection and Enhancing Website Security
This paper will research the website page database security help of optimization and encryption method and proposes Fully Homomorphic Encryption (FHE) encryption for enhancing the security level of attack detection and prevention.
Malware Detection and Signature Generation
A hybrid method for detection of malware using the correlation between the semantics of the malware and its API calls and the ANFIS-SSA approach, which develops a base signature for a whole malware class more than for a solitary specimen of malware.
Proficient Decision Support System for Detection of Chronic Kidney Disease
The presented structure gathers the patient information utilizing the IoT gadgets joined to the client which will be put away in the cloud alongside the related therapeutic records from the UCI vault.
Different Data Replication Strategies in Cloud Environment
A comparative study of the different data replication strategies such as ADRS (Adaptive Data Replication Strategy), DCR2S (Dynamic Cost Aware Re-replication and Rebalancing Strategy) and EPA (Efficient Placement Algorithm) in cloud environment by using various parameters.
Energy through Multi-Hop Routing Protocol for WSNS
This work presents modified chemical reaction optimization (MCRO) algorithm to form clusters and select cluster head (CH) among the cluster members and shows that the proposed routing protocol provides significant energy efficiency with network lifetime over the existing routing protocols.
Clustering Based Data Dissemination Protocol for Vehicular Ad Hoc
The wirelessly connected networks of vehicular nodes are Vehicular Ad Hoc Networks (VANET). The discrete optimization is assumed as the optimal path issue that allows QoS-aware data dissemination and
Investors Services Selection of Mutual Fund
Investment is an type of activity for the people that are made from their savings. A variety of different investment options are available in savings avenues that are bank, Gold and financial


A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows
This paper proposes an effective detection method, which is designed to detect the DDoS attack and to further locate the compromised interfaces the malicious attackers have connected, and demonstrates the superiority of the method in terms of promptness, versatility and accuracy.
Dynamic attack detection and mitigation in IoT using SDN
  • S. Bhunia, G. Mohan
  • Computer Science
    2017 27th International Telecommunication Networks and Applications Conference (ITNAC)
  • 2017
An SDN-based secure IoT framework called SoftThings is proposed to detect abnormal behaviors and attacks as early as possible and mitigate as appropriate and initial results show that this framework is capable to detect attacks on IoT with around 98% precision.
A multi-criteria-based DDoS-attack prevention solution using software defined networking
This paper analyzes the characteristics of traffic flows up-streaming to a Vietnamese ISP server, during both states of normal and DDoS attack traffic and proposes an SDN-based Attack Prevention Architecture that is able to capture and analyze incoming flows on-the-fly.
Lightweight DDoS flooding attack detection using NOX/OpenFlow
This work presents a lightweight method for DDoS attack detection based on traffic flow features, in which the extraction of such information is made with a very low overhead compared to traditional approaches.
A DDoS Attack Detection Method Based on SVM in Software Defined Network
The SDN environment by mininet and floodlight is constructed, 6-tuple characteristic values of the switch flow table is extracted, and then DDoS attack model is built by combining the SVM classification algorithms and average accuracy rate of the method is with a small amount of flow collecting.
Early detection of DDoS attacks against SDN controllers
  • S. Mousavi, M. St-Hilaire
  • Computer Science
    2015 International Conference on Computing, Networking and Communications (ICNC)
  • 2015
This paper shows how DDoS attacks can exhaust controller resources and provides a solution to detect such attacks based on the entropy variation of the destination IP address and introduces a solution that is effective and lightweight in terms of the resources that it uses.
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
It is argued that the network will have to play a critical role in securing IoT deployments and network security needs to be rethink along three key dimensions: abstractions for security policies; mechanisms to learn attack and normal profiles; and dynamic and context-aware enforcement capabilities.
A SDN-oriented DDoS blocking scheme for botnet-based attacks
This paper discusses a DDoS blocking application that runs over the SDN controller while using the standard OpenFlow interface, and investigates how a software-defined network can be utilized to overcome the difficulty and effectively block legitimate looking DDoS attacks mounted by a larger number of bots.