Detection of Application-Layer Dos Attacks in IoT Devices Using Feature Selection and Machine Learning Models
Keywords:
Distributed Denial of Service (DDoS), Cybersecurity, Internet of Things, Feature SelectionAbstract
With technological advancements, innovations like the Internet of Things (IoT) have become widespread, connecting more devices to the Internet. However, as the number of connected devices increases, cyber-attacks—especially Distributed Denial of Service (DDoS) attacks—are also becoming more frequent. This research explores these cyber threats, focusing on DDoS attacks, and proposes strategies to protect IoT devices. It specifically aims to detect DDoS attacks in IoT devices using feature selection methods and machine learning algorithms. The study targets attack detection at the application layer of IoT devices by analyzing a relevant dataset. By applying feature selection techniques and machine learning models, we strive to enhance the accuracy and efficiency of DDoS detection, ultimately improving IoT security
References
D. Kshirsagar and S. Kumar, “A feature reduction based reflected and exploited DDoS attacks detection system,” J. Ambient Intell. Humaniz. Comput., vol. 13, no. 1, pp. 393–405, Jan. 2022, doi: 10.1007/S12652-021-02907-5/METRICS.
H. B. and M. F. D. Mohammed Sharif, “Detection of Application-Layer DDoS Attacks Produced by Various Freely Accessible Toolkits Using Machine Learning,” IEEE Access, vol. 11, pp. 51810–51819, 2023, doi: 10.1109/ACCESS.2023.3280122.
A. Praseed and P. S. Thilagam, “Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 617–626, 2021, doi: 10.1109/TIFS.2020.3017928.
D. M. S. and M. F. H. Beitollahi, “Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function,” IEEE Access, vol. 10, pp. 63844–63854, 2022, doi: 10.1109/ACCESS.2022.3182818.
C. Benzaid, M. Boukhalfa, and T. Taleb, “Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment,” IEEE Wirel. Commun. Netw. Conf. WCNC, vol. 2020-May, May 2020, doi: 10.1109/WCNC45663.2020.9120472.
A. Munshi, N. A. Alqarni, and N. Abdullah Almalki, “DDOS Attack on IOT Devices,” ICCAIS 2020 - 3rd Int. Conf. Comput. Appl. Inf. Secur., Mar. 2020, doi: 10.1109/ICCAIS48893.2020.9096818.
M. Odusami, S. Misra, O. Abayomi-Alli, A. Abayomi-Alli, and L. Fernandez-Sanz, “A survey and meta-analysis of application-layer distributed denial-of-service attack,” Int. J. Commun. Syst., vol. 33, no. 18, p. e4603, Dec. 2020, doi: 10.1002/DAC.4603.
V. Gaur and R. Kumar, “Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices,” Arab. J. Sci. Eng., vol. 47, no. 2, pp. 1353–1374, Feb. 2022, doi: 10.1007/S13369-021-05947-3/METRICS.
S. Z. & S. M. Mohammad Najafimehr, “A hybrid machine learning approach for detecting unprecedented DDoS attacks,” J. Supercomput., vol. 78, pp. 8106–8136, 2022, doi: https://doi.org/10.1007/s11227-021-04253-x.
C. V.-R. and J. A. P.-D. N. M. Yungaicela-Naula, “SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning,” IEEE Access, vol. 9, pp. 108495–108512, 2021, doi: 10.1109/ACCESS.2021.3101650.
I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy,” Proc. - Int. Carnahan Conf. Secur. Technol., vol. 2019-October, Oct. 2019, doi: 10.1109/CCST.2019.8888419.
M. T. Mahmood, S. R. A. Ahmed, and M. R. A. Ahmed, “Using Machine Learning to Secure IOT Systems,” 4th Int. Symp. Multidiscip. Stud. Innov. Technol. ISMSIT 2020 - Proc., Oct. 2020, doi: 10.1109/ISMSIT50672.2020.9254304.
T. T. Khoei, G. Aissou, W. C. Hu, and N. Kaabouch, “Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid,” IEEE Int. Conf. Electro Inf. Technol., vol. 2021-May, pp. 129–135, May 2021, doi: 10.1109/EIT51626.2021.9491891.
V. Gaur and R. Kumar, “FSMDAD: Feature Selection Method for DDoS Attack Detection,” Proc. Int. Conf. Electron. Renew. Syst. ICEARS 2022, pp. 939–944, 2022, doi: 10.1109/ICEARS53579.2022.9752308.
V. Gaur and R. Kumar, “ET-RF based Model for Detection of Distributed Denial of Service Attacks,” Int. Conf. Sustain. Comput. Data Commun. Syst. ICSCDS 2022 - Proc., pp. 1205–1212, 2022, doi: 10.1109/ICSCDS53736.2022.9760938.
K. C. Amir Mosavi, Pinar Ozturk, “Flood Prediction Using Machine Learning Models: Literature Review,” Water, vol. 10, no. 11, p. 1536, 2018, doi: https://doi.org/10.3390/w10111536.
T. R. Mohamed El Kourdi, Amine Bensaid, “Automatic Arabic document categorization based on the Naïve Bayes algorithm,” Proc. Work. Comput. Approaches to Arab. Script-based Lang. (Semitic ’04). Assoc. Comput. Linguist. USA, pp. 51–58, 2004, [Online]. Available: https://dl.acm.org/doi/10.5555/1621804.1621819

Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 50SEA

This work is licensed under a Creative Commons Attribution 4.0 International License.