IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things: A Research Survey

Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things: A Research Survey
View Sample PDF
Author(s): Pheeha Machaka (Decision Sciences Department, University of South Africa, South Africa)and Fulufhelo Nelwamondo (Modelling and Digital Science, Council for Scientific and Industrial Research, South Africa)
Copyright: 2016
Pages: 60
Source title: Data Mining Trends and Applications in Criminal Science and Investigations
Source Author(s)/Editor(s): Omowunmi E. Isafiade (University of Cape Town, South Africa)and Antoine B. Bagula (University of the Western Cape, South Africa)
DOI: 10.4018/978-1-5225-0463-4.ch010

Purchase


Abstract

This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.

Related Content

. © 2023. 34 pages.
. © 2023. 15 pages.
. © 2023. 15 pages.
. © 2023. 18 pages.
. © 2023. 24 pages.
. © 2023. 32 pages.
. © 2023. 21 pages.
Body Bottom