The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Data Mining Techniques for Distributed Denial of Service Attacks Detection in the Internet of Things: A Research Survey
Abstract
This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.
Related Content
Ravi Mohan Sharma, Sunita Dwivedi, Vinod Kumar.
© 2025.
18 pages.
|
Nagendra Singh Yadav, Vishal Kumar Goar.
© 2025.
40 pages.
|
Venkat Narayana Rao T., M. Stephen, Rohan Kolachala.
© 2025.
28 pages.
|
Guillermo M. Limon-Molina, E. Ivette Cota-Rivera, Maria E. Raygoza-Limón, Fabian N. Murrieta-Rico, Jesus Heriberto Orduño-Osuna, Roxana Jimenez-Sánchez, Miguel E. Bravo-Zanoguera, Abelardo Mercado.
© 2025.
12 pages.
|
Ravi Kant Kumar, Sobin C. C..
© 2025.
20 pages.
|
S. Aditi Apurva.
© 2025.
18 pages.
|
Parveen Sadotra, Pradeep Chouksey, Mayank Chopra, Rabia Koser, Rishikesh Rawat.
© 2025.
16 pages.
|
|
|