4.5 Article

Design of an IoT DDoS attack prediction system based on data mining technology

期刊

JOURNAL OF SUPERCOMPUTING
卷 78, 期 4, 页码 4601-4623

出版社

SPRINGER
DOI: 10.1007/s11227-021-04055-1

关键词

Data mining; Internet of things (IoT); Cyberattack; Distributed denial-of-service (DDoS)

资金

  1. Scientific Research Fund of Dongguan Polytechnic [2020a03]
  2. colleges and universities of the Education Department of Guangdong Province [2020KTSCX320]

向作者/读者索取更多资源

This paper discusses the issue of DDoS attacks in the IoT environment and proposes an attack prediction system based on data mining technology, which consists of two major modules: the DDoS attack prediction model-construction module and the DDoS attack prediction defense module.
Due to the rise of the Internet of things (IoT), the threat to information security extends from general servers to IoT devices. Possible IoT security issues include all kinds of network attacks. Distributed denial-of-service (DDoS) attacks are notoriously difficult to prevent. With the continuous evolution of DDoS attacks, from simple network packet attacks, it has become possible for hackers to hide in legitimate paths. At times, large numbers of non-legitimate attack packets can occur, which can be a major problem that enterprises cannot protect themselves against. This paper proposes a data-mining technology-based DDoS attack prediction system, designed for use in the IoT environment. The system can be divided into two major modules: 1. the DDoS attack prediction model-construction module and 2. the DDoS attack prediction defence module. In the DDoS attack prediction model-construction module, through the integration of data-mining classification technology, the SVM algorithm is used to dig out the classification basis of a possible attack. The attack prediction model is then established, and the prediction result is corrected in real time. The results of the study conducted showed that when an attacker attempts to launch an attack, the system design will predict the timing of the DDoS attack, and existing IP backtracking technology can be used to track the source of the attack, block the source of the attack in advance and achieve the purpose of defence.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据