Research Article

Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods

Number: 28 November 30, 2021
TR EN

Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods

Abstract

In today, Internet of Things (IoT) has a wide usage area and makes easier our lives with smart objects that can communicate with each other without human intervention. However, as with Wireless Sensor Networks, IoT networks bring new risks. These risks reaching worrying levels cause some significant issues such as security, privacy, and energy in the network topology. The IPv6 Routing Protocol for Low-Power and Lossy Network (RPL) is a routing protocol for resource-constrained devices in IoT networks. When it transmits packets between nodes, the nodes can be exposed to a series of attacks. DODAG Information Solicitation (DIS) Flooding attack is one of the most effective types of attacks against this protocol and negatively affects the energy level of the node and its limited processing capacities. Although many intrusion detection methods are used to detect attacks in IoT security, innovative and energy-saving methods are needed. DIS Flooding attacks detection and prevention methods have not been adequately presented in the literature. To address the mentioned need, this study provides high-performance detection of DIS Flooding attacks by applying Logical Regression (LR) and Support Vector Machine machine learning methods. The experiments are implemented by using the Contiki-Cooja simulation environment and the experimental results have been evaluated using various performance metrics. It can be concluded that LR achieves higher attack detection in terms of accuracy.

Keywords

References

  1. A. Rayes, S. Salam, Chapter 1 Internet of Things (IoT) Overview, Internet of Things From Hype to Reality, Springer Nature Switzerland AG, pp. 1-35, 2019. https://doi.org/10.1007/978-3-319-99516-8_1
  2. A. Verma and V. Ranga, “Mitigation of DIS flooding attacks in RPL-based 6LoWPAN net-works,” Trans Emerging Tel Tech., vol. 31(2), e3802, pp. 1-25, 2020. https://doi.org/10.1002/ett.3802
  3. V. Odumuyiwa and R. Alabi, “DDOS Detection on Internet of Things Using Unsupervised Algorithms”, Journal of Cyber Security and Mobility, vol. 10, no. 3, pp. 569-592, 2021. https://doi.org/10.13052/ jcsm2245-1439.1034
  4. S. Cakir, S. Toklu, and N. Yalcin, “RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning,” IEEE Access, vol. 8, pp. 183678-183689, 2020. https://doi.org/10.1109/ACCESS.2020.3029191
  5. F. S. De Lima Filho, F. A. F. Silveira, A. De Medeiros Brito Junior, G. Vargas-Solar, and L. F. Silveira, “Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning,” Security and Communication Networks, vol. 2019, pp. 1-15, 2019. https://doi.org/10.1155/2019/1574749
  6. R. Abubakar, A. Aldegheishem, M. Majeed, A. Mehmood, N. Alrajeh, and M. Carsten, “An Effective Mechanism to Mitigate Real-time DDoS Attack Using Dataset”, IEEE Access, vol. 8, pp. 126215-126227, 2020. https://doi.org/10.1109/ACCESS.2020.2995820
  7. S. Sambangi and L. Gondi, “A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression,” in Multidisciplinary Digital Publishing Institute Proc., vol. 63, p. 51, https://doi.org/10.3390/proceedings2020063051
  8. A. Saied, R. E. Overill, and T. Radzik, “Detection of known and unknown DDoS attacks using Artificial Neural Networks,” Neurocomputing, vol. 172, pp. 385-393, 2016. https://doi.org/ 10.1016/j.neucom.2015.04.101

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

November 30, 2021

Submission Date

October 26, 2021

Acceptance Date

November 1, 2021

Published in Issue

Year 2021 Number: 28

APA
Çakır, S., & Yalçın, N. (2021). Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods. Avrupa Bilim Ve Teknoloji Dergisi, 28, 1317-1320. https://doi.org/10.31590/ejosat.1014917
AMA
1.Çakır S, Yalçın N. Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods. EJOSAT. 2021;(28):1317-1320. doi:10.31590/ejosat.1014917
Chicago
Çakır, Semih, and Nesibe Yalçın. 2021. “Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods”. Avrupa Bilim Ve Teknoloji Dergisi, nos. 28: 1317-20. https://doi.org/10.31590/ejosat.1014917.
EndNote
Çakır S, Yalçın N (November 1, 2021) Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods. Avrupa Bilim ve Teknoloji Dergisi 28 1317–1320.
IEEE
[1]S. Çakır and N. Yalçın, “Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods”, EJOSAT, no. 28, pp. 1317–1320, Nov. 2021, doi: 10.31590/ejosat.1014917.
ISNAD
Çakır, Semih - Yalçın, Nesibe. “Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods”. Avrupa Bilim ve Teknoloji Dergisi. 28 (November 1, 2021): 1317-1320. https://doi.org/10.31590/ejosat.1014917.
JAMA
1.Çakır S, Yalçın N. Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods. EJOSAT. 2021;:1317–1320.
MLA
Çakır, Semih, and Nesibe Yalçın. “Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods”. Avrupa Bilim Ve Teknoloji Dergisi, no. 28, Nov. 2021, pp. 1317-20, doi:10.31590/ejosat.1014917.
Vancouver
1.Semih Çakır, Nesibe Yalçın. Detection of DIS Flooding Attacks in IoT Networks Using Machine Learning Methods. EJOSAT. 2021 Nov. 1;(28):1317-20. doi:10.31590/ejosat.1014917

Cited By