Detection of Application-Layer Dos Attacks in IoT Devices Using Feature Selection and Machine Learning Models

Authors

  • Mustabeen Aziz Department of Information Technology, University of Gujrat, Pakistan
  • Muhammad Usman Sana Department of Software Engineering, University of Gujrat, Pakistan
  • Tayybah Kiren Department of Computer Science (RCET), University of Engineering and Technology Lahore, Pakistan
  • Tahmina Ehsan Department of Information Technology, University of Gujrat, Pakistan
  • Alvena Ehsan Department of Information Technology, University of Gujrat, Pakistan
  • Fateha Minahil Department of Information Technology, University of Gujrat, Pakistan

Keywords:

Distributed Denial of Service (DDoS), Cybersecurity, Internet of Things, Feature Selection

Abstract

With technological advancements, innovations like the Internet of Things (IoT) have become widespread, connecting more devices to the Internet. However, as the number of connected devices increases, cyber-attacks—especially Distributed Denial of Service (DDoS) attacks—are also becoming more frequent. This research explores these cyber threats, focusing on DDoS attacks, and proposes strategies to protect IoT devices. It specifically aims to detect DDoS attacks in IoT devices using feature selection methods and machine learning algorithms. The study targets attack detection at the application layer of IoT devices by analyzing a relevant dataset. By applying feature selection techniques and machine learning models, we strive to enhance the accuracy and efficiency of DDoS detection, ultimately improving IoT security

References

D. Kshirsagar and S. Kumar, “A feature reduction based reflected and exploited DDoS attacks detection system,” J. Ambient Intell. Humaniz. Comput., vol. 13, no. 1, pp. 393–405, Jan. 2022, doi: 10.1007/S12652-021-02907-5/METRICS.

H. B. and M. F. D. Mohammed Sharif, “Detection of Application-Layer DDoS Attacks Produced by Various Freely Accessible Toolkits Using Machine Learning,” IEEE Access, vol. 11, pp. 51810–51819, 2023, doi: 10.1109/ACCESS.2023.3280122.

A. Praseed and P. S. Thilagam, “Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 617–626, 2021, doi: 10.1109/TIFS.2020.3017928.

D. M. S. and M. F. H. Beitollahi, “Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function,” IEEE Access, vol. 10, pp. 63844–63854, 2022, doi: 10.1109/ACCESS.2022.3182818.

C. Benzaid, M. Boukhalfa, and T. Taleb, “Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment,” IEEE Wirel. Commun. Netw. Conf. WCNC, vol. 2020-May, May 2020, doi: 10.1109/WCNC45663.2020.9120472.

A. Munshi, N. A. Alqarni, and N. Abdullah Almalki, “DDOS Attack on IOT Devices,” ICCAIS 2020 - 3rd Int. Conf. Comput. Appl. Inf. Secur., Mar. 2020, doi: 10.1109/ICCAIS48893.2020.9096818.

M. Odusami, S. Misra, O. Abayomi-Alli, A. Abayomi-Alli, and L. Fernandez-Sanz, “A survey and meta-analysis of application-layer distributed denial-of-service attack,” Int. J. Commun. Syst., vol. 33, no. 18, p. e4603, Dec. 2020, doi: 10.1002/DAC.4603.

V. Gaur and R. Kumar, “Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices,” Arab. J. Sci. Eng., vol. 47, no. 2, pp. 1353–1374, Feb. 2022, doi: 10.1007/S13369-021-05947-3/METRICS.

S. Z. & S. M. Mohammad Najafimehr, “A hybrid machine learning approach for detecting unprecedented DDoS attacks,” J. Supercomput., vol. 78, pp. 8106–8136, 2022, doi: https://doi.org/10.1007/s11227-021-04253-x.

C. V.-R. and J. A. P.-D. N. M. Yungaicela-Naula, “SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning,” IEEE Access, vol. 9, pp. 108495–108512, 2021, doi: 10.1109/ACCESS.2021.3101650.

I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy,” Proc. - Int. Carnahan Conf. Secur. Technol., vol. 2019-October, Oct. 2019, doi: 10.1109/CCST.2019.8888419.

M. T. Mahmood, S. R. A. Ahmed, and M. R. A. Ahmed, “Using Machine Learning to Secure IOT Systems,” 4th Int. Symp. Multidiscip. Stud. Innov. Technol. ISMSIT 2020 - Proc., Oct. 2020, doi: 10.1109/ISMSIT50672.2020.9254304.

T. T. Khoei, G. Aissou, W. C. Hu, and N. Kaabouch, “Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid,” IEEE Int. Conf. Electro Inf. Technol., vol. 2021-May, pp. 129–135, May 2021, doi: 10.1109/EIT51626.2021.9491891.

V. Gaur and R. Kumar, “FSMDAD: Feature Selection Method for DDoS Attack Detection,” Proc. Int. Conf. Electron. Renew. Syst. ICEARS 2022, pp. 939–944, 2022, doi: 10.1109/ICEARS53579.2022.9752308.

V. Gaur and R. Kumar, “ET-RF based Model for Detection of Distributed Denial of Service Attacks,” Int. Conf. Sustain. Comput. Data Commun. Syst. ICSCDS 2022 - Proc., pp. 1205–1212, 2022, doi: 10.1109/ICSCDS53736.2022.9760938.

K. C. Amir Mosavi, Pinar Ozturk, “Flood Prediction Using Machine Learning Models: Literature Review,” Water, vol. 10, no. 11, p. 1536, 2018, doi: https://doi.org/10.3390/w10111536.

T. R. Mohamed El Kourdi, Amine Bensaid, “Automatic Arabic document categorization based on the Naïve Bayes algorithm,” Proc. Work. Comput. Approaches to Arab. Script-based Lang. (Semitic ’04). Assoc. Comput. Linguist. USA, pp. 51–58, 2004, [Online]. Available: https://dl.acm.org/doi/10.5555/1621804.1621819

Downloads

Published

2025-03-14

How to Cite

Aziz, M., Sana, M. U., Kiren, T., Ehsan, T., Ehsan, A., & Minahil, F. (2025). Detection of Application-Layer Dos Attacks in IoT Devices Using Feature Selection and Machine Learning Models. International Journal of Innovations in Science & Technology, 7(5), 197–207. Retrieved from https://journal.50sea.com/index.php/IJIST/article/view/1246

Most read articles by the same author(s)