journal article Open Access Jul 17, 2023

DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions

Electronics Vol. 12 No. 14 pp. 3103 · MDPI AG
View at Publisher Save 10.3390/electronics12143103
Abstract
With the emergence of technology, the usage of IoT (Internet of Things) devices is said to be increasing in people’s lives. Such devices can benefit the average individual, who does not necessarily have to have technical knowledge. The IoT can be found in home security and alarm systems, smart fridges, smart televisions, and more. Although small Internet-connected devices have numerous benefits and can help enhance people’s efficiency, they also can pose a security threat. Malicious actors often attempt to find new ways to exploit and utilize certain resources, and IoT devices are a perfect candidate for such exploitation due to the huge volume of active devices. This is particularly true for Distributed Denial of Service (DDoS) attacks, which involve the exploitation of a massive number of devices, such as IoT devices, to act as bots and send fraudulent requests to services, thus obstructing them. To identify and detect whether such attacks have occurred or not in a network, there must be a reliable mechanism of detection based on adequate techniques. The most common technique for this purpose is artificial intelligence, which involves the use of Machine Learning (ML) and Deep Learning (DL) to help identify cyberattacks. ML models involve algorithms that use structured data to learn from, predict outcomes from, and identify patterns. The goal of this paper is to review selected studies and publications relevant to the topic of DDoS detection in IoT-based networks using machine-learning-relevant publications. It offers a wealth of references for academics looking to define or expand the scope of their research in this area.
Topics

No keywords indexed for this article. Browse by subject →

References
53
[1]
Wang "IFACNN: Efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks" Math. Biosci. Eng. (2021) 10.3934/mbe.2022059
[2]
Hasan, M. (2023, May 14). State of IOT 2022: Number of Connected IOT Devices Growing 18% to 14.4 Billion Globally. IoT Analytics. Available online: https://iot-analytics.com/number-connected-iot-devices/.
[3]
Kim, H.S. (2022, August 28). Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Available online: https://www.researchgate.net/profile/Mohamed-Mourad-Lafifi/post/Is_there_any_simulation_tool_for_fog_computing/attachment/59d638c079197b8077995f4c/AS%3A398883160117248%401472112564706/download/Fog+Computing+and+the+Internet+of+Things++Extend+the+Cloud+to+Where+the+Things+Are.pdf.
[4]
Ma, K., Bagula, A., Nyirenda, C., and Ajayi, O. (2019). An IoT-Based Fog Computing Model. Sensors, 19. 10.3390/s19122783
[5]
DoS and DDoS vulnerability of IoT: A review

Emina Džaferović, Ajla Sokol, Ali Abd Almisreb et al.

Sustainable Engineering and Innovation 2019 10.37868/sei.v1i1.36
[6]
"The evolution of DDoS" Comput. Fraud Secur. (2014) 10.1016/s1361-3723(14)70541-x
[7]
Sieklik "Evaluation of TFTP DDoS amplification attack" Comput. Secur. (2016) 10.1016/j.cose.2015.09.006
[8]
Lukaseder, T., Stölzle, K., Kleber, S., Erb, B., and Kargl, F. (2018, January 1–4). An SDN-based Approach for Defending against Reflective DDoS Attacks. Proceedings of the 2018 IEEE 43rd Conference on Local Computer Networks (LCN), Chicago, IL, USA. 10.1109/lcn.2018.8638036
[9]
Neelam "Research Trends in Security and DDoS in SDN" Secur. Commun. Netw. (2016) 10.1002/sec.1759
[10]
Ehrenkranz "On the State of IP Spoofing Defense" ACM Trans. Internet Technol. (2009) 10.1145/1516539.1516541
[11]
Vishwakarma "A survey of DDoS attacking techniques and defence mechanisms in the IoT network" Telecommun. Syst. (2019) 10.1007/s11235-019-00599-z
[12]
McGregory "Preparing for the next DDoS attack" Netw. Secur. (2013) 10.1016/s1353-4858(13)70058-8
[13]
Dantas, Y.G., Nigam, V., and Fonseca, I.E. (2014, January 24–26). A selective defense for application layer ddos attacks. Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, The Hague, The Netherlands. 10.1109/jisic.2014.21
[14]
(2022, September 26). Decision Tree Classification Algorithm. JavaTpoint. Available online: https://www.javatpoint.com/machine-learning-decision-tree-classification-algorithm.
[15]
(2022, September 29). Random Forest Algorithm. JavaTpoint. Available online: https://www.javatpoint.com/machine-learning-random-forest-algorithm.
[16]
Yiu, T. (2022, October 10). Understanding Random Forest. Towardsdatascience. Available online: https://towardsdatascience.com/understanding-random-forest-58381e0602d2.
[17]
(2022, September 26). What Is a Random Forest?. Available online: https://www.tibco.com/reference-center/what-is-a-random-forest.
[18]
(2022, October 10). K-Nearest Neighbor(KNN) Algorithm for Machine Learning. Javatpoint. Available online: https://www.javatpoint.com/k-nearest-neighbor-algorithm-for-machine-learning.
[19]
(2022, October 10). What Is XGBoost? NVIDIA Data Science Glossary. Available online: https://www.nvidia.com/en-us/glossary/data-science/xgboost/.
[20]
(2022, September 29). XGBoost. Geeksforgeeks. Available online: https://www.geeksforgeeks.org/xgboost/.
[21]
Ghatak, K. (2023, January 09). XGBoost Algorithm in Machine Learning. Naukri Learning. Available online: https://www.shiksha.com/online-courses/articles/xgboost-algorithm-in-machine-learning/.
[22]
(2022, October 10). Artificial Neural Network Tutorial. Javatpoint. Available online: https://www.javatpoint.com/artificial-neural-network.
[23]
(2022, September 26). Recurrent Neural Network Algorithms Overview. BUSINESS & AI: Artificial Intelligence for Better Decision Making. Available online: https://www.business-and-ai.com/recurrent-neural-network-algorithms-overview/.
[24]
(2022, October 10). Support Vector Machine Algorithm. Javatpoint. Available online: https://www.javatpoint.com/machine-learning-support-vector-machine-algorithm.
[25]
(2022, September 29). Introduction to Support Vector Machines (SVM). Geeksforgeeks. Available online: https://www.geeksforgeeks.org/introduction-to-support-vector-machines-svm/.
[26]
(2022, September 29). The Ultimate Guide to AdaBoost Algorithm|What Is AdaBoost Algorithm?. Available online: https://www.mygreatlearning.com/blog/adaboost-algorithm/.
[27]
(2022, September 29). Boosting in Machine Learning|Boosting and AdaBoost. Geeksforgeeks. Available online: https://www.geeksforgeeks.org/boosting-in-machine-learning-boosting-and-adaboost/.
[28]
Saini, A. (2022, September 29). AdaBoost Algorithm—A Complete Guide for Beginners. Analytics Vidhya. Available online: https://www.analyticsvidhya.com/blog/2021/09/adaboost-algorithm-a-complete-guide-for-beginners/.
[29]
Almaraz-Rivera, J.G., Perez-Diaz, J.A., and Cantoral-Ceballos, J.A. (2022). Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models. Sensors, 22. 10.3390/s22093367
[30]
Koroniotis "Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset" Future Gener. Comput. Syst. (2019) 10.1016/j.future.2019.05.041
[31]
Liu, Z., Thapa, N., Shaver, A., Roy, K., Siddula, M., Yuan, X., and Yu, A. (2021). Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1—A New IoT Dataset. Sensors, 21. 10.3390/s21144834
[32]
Ullah, I., and Mahmoud, Q.H. (2020). Advances in Artificial Intelligence, Springer.
[33]
Alsaed "TON_IoT Telemetry Dataset: A NewGeneration Dataset of IoT and IIoT forDatadriven Intrusion Detection Systems" IEEE Access (2020) 10.1109/access.2020.3022862
[34]
Panigrahi "A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems" Int. J. Eng. Technol. (2018)
[35]
Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A. (2018, January 22–24). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Proceedings of the International Conference on Information Systems Security And Privacy (ICISSP), Funchal, Portugal. 10.5220/0006639801080116
[36]
Gopi "Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things" Multimed. Tools Appl. (2021)
[37]
Amrish "DDoS Detection using Machine Learning Techniques" J. IoT Soc. Mob. Anal. Cloud (2022)
[38]
Gaur "Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices" Arab. J. Sci. Eng. (2022) 10.1007/s13369-021-05947-3
[39]
Ismail "A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks" IEEE Access (2022) 10.1109/access.2022.3152577
[40]
Seifousadati, A., Ghasemshirazi, S., and Fathian, M. (2021). A Machine Learning Approach for DDoS Detection on IoT Devices. arXiv.
[41]
Aysa, M.H., Ibrahim, A.A., and Mohammed, A.H. (2020, January 22–24). IoT Ddos Attack Detection Using Machine Learning. Proceedings of the 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Istanbul, Turkey. 10.1109/ismsit50672.2020.9254703
[42]
Saini, P.S., Behal, S., and Bhatia, S. (2020, January 12–14). Detection of DDoS Attacks using Machine Learning Algorithms. Proceedings of the 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India. 10.23919/indiacom49435.2020.9083716
[43]
Alkasassbeh "Detecting Distributed Denial of Service Attacks Using Data Mining Techniques" Int. J. Adv. Comput. Sci. Appl. (IJACSA) (2016)
[44]
Pande, S., Khamparia, A., Gupta, D., and Thanh, D.N.H. (2021). Recent Studies on Computational Intelligence, Springer. Studies in Computational Intelligence.
[45]
Gupta "Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers" Comput. Electr. Eng. (2022) 10.1016/j.compeleceng.2022.107726
[46]
Mihoub "Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques" Comput. Electr. Eng. (2022) 10.1016/j.compeleceng.2022.107716
[47]
Pokhrel, S., Abbas, R., and Aryal, B. (2021). IoT Security: Botnet detection in IoT using Machine learning. arXiv.
[48]
Doshi, R., Apthorpe, N., and Feamster, N. (2018, January 24). Machine Learning DDoS Detection for Consumer Internet of Things Devices. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA. 10.1109/spw.2018.00013
[49]
Islam, U., Muhammad, A., Mansoor, R., Hossain, M.S., Ahmad, I., Tageldin, E., Khan, J.A., Rehman, A.U., and Shafiq, M. (2022). Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models. Sustainability, 14. 10.3390/su14148374
[50]
Roopak, M., Tian, G.Y., and Chambers, J. (2020, January 6–8). An Intrusion Detection System Against DDoS Attacks in IoT Networks. Proceedings of the 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA. 10.1109/ccwc47524.2020.9031206

Showing 50 of 53 references

Metrics
69
Citations
53
References
Details
Published
Jul 17, 2023
Vol/Issue
12(14)
Pages
3103
License
View
Authors
Funding
SAUDI ARAMCO Cybersecurity Chair at Imam Abdulrahman Bin Faisal University
Cite This Article
Amal A. Alahmadi, Malak Aljabri, Fahd Alhaidari, et al. (2023). DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions. Electronics, 12(14), 3103. https://doi.org/10.3390/electronics12143103
Related

You May Also Like

Machine Learning Interpretability: A Survey on Methods and Metrics

Diogo V. Carvalho, Eduardo M. Pereira · 2019

1,384 citations

The k-means Algorithm: A Comprehensive Survey and Performance Evaluation

Mohiuddin Ahmed, Raihan Seraj · 2020

1,342 citations

Sentiment Analysis Based on Deep Learning: A Comparative Study

Nhan Cach Dang, María N. Moreno-García · 2020

550 citations