Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Distributed Denial of Service Attack Detection and Prevention Model for IoT based Computing Environment using Ensemble Machine Learning Approach

google+
Views: 74                 

Author :  Nicholas Oluwole Ogini

Affiliation :  Delta State University

Country :  Nigeria

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  14, 4, July, 2022

Abstract :


Defending against Distributed Denial of Service (DDoS) in the Internet of Things (IoT) computing environment is a challenging task. DDoS attacks are type of collective attack in which attackers work together to compromise internet security and services. The resource-constrained devices used in IoT deployments have made it even easier for an attacker to break, because of the vast number of vulnerable IoT devices with significant compute power. This paper proposed an ensemble machine learning (ML) model using the bagging technique to detect and prevent DDoS attacks in the IoT computing environment. We carried out an Machine Learning experiment and evaluated our proposed model with the most recent DDoS attacks (CICDoS2019) dataset. We use seven validation metrics (classification accuracy, precision rate, recall rate, f1-score, Matthews Correlation Coefficient, false negative rate and false positive rate) to evaluate the performance of the proposed model. The results obtained in our experiment shows an improved performance with an overall maximum classification accuracy of 99.75%, precision rate of 99.99%, recall rate of 99.76%, f1-score of 99.87%, Matthews Correlation Coefficient of 0.000000214, false negative rate of 0.24% and 4.42% false positive rate.

Keyword :  Internet of Things, DDoS Attacks, Ensemble Machine Learning, Security, & Detection Models

URL :  https://aircconline.com/ijnsa/V14N4/14422ijnsa03.pdf

User Name : Brendon Clarke
Posted 17-08-2022 on 16:42:29 AEDT



Related Research Work

  • Service Oriented Configuration Management Of ‎software ‎architecture
  • Service Oriented Configuration Management Of ‎software ‎architecture
  • Metrics For Evaluating Alerts In Intrusion Detection Systems
  • Hybrid Cryptographic Technique Using Rsa Algorithm And Scheduling Concepts

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals