利用机器学习算法预防物联网Hello Flood攻击的新方法

Serkan Gönen, Mehmet Ali Barişkan, Gökçe Karacayılmaz, Birkan Alhan, Ercan Nurcan Yilmaz, Harun Artuner, Erhan Sindiren
{"title":"利用机器学习算法预防物联网Hello Flood攻击的新方法","authors":"Serkan Gönen, Mehmet Ali Barişkan, Gökçe Karacayılmaz, Birkan Alhan, Ercan Nurcan Yilmaz, Harun Artuner, Erhan Sindiren","doi":"10.31202/ecjse.1149925","DOIUrl":null,"url":null,"abstract":"With the developments in information technologies, every area of our lives, from shopping to education, from health to entertainment, has transitioned to the cyber environment, defined as the digital environment. In particular, the concept of the Internet of Things (IoT) has emerged in the process of spreading the internet and the idea of controlling and managing every device based on IP. The fact that IoT devices are interconnected with limited resources causes users to become vulnerable to internal and external attacks that threaten their security. In this study, a Flood attack, which is an important attack type against IoT networks, is discussed. Within the scope of the analysis of the study, first of all, the effect of the flood attack on the system has been examined. Subsequently, it has been focused on detecting the at-tack through the K-means algorithm, a machine learning algorithm. The analysis results have been shown that the attacking mote where the flood attack has been carried out has been successfully detected. In this way, similar flood attacks will be detected as soon as possible, and the system will be saved from the attack with the most damage and will be activated as soon as possible.","PeriodicalId":11622,"journal":{"name":"El-Cezeri Fen ve Mühendislik Dergisi","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel Approach to Prevention of Hello Flood Attack in IoT Using Machine Learning Algorithm\",\"authors\":\"Serkan Gönen, Mehmet Ali Barişkan, Gökçe Karacayılmaz, Birkan Alhan, Ercan Nurcan Yilmaz, Harun Artuner, Erhan Sindiren\",\"doi\":\"10.31202/ecjse.1149925\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the developments in information technologies, every area of our lives, from shopping to education, from health to entertainment, has transitioned to the cyber environment, defined as the digital environment. In particular, the concept of the Internet of Things (IoT) has emerged in the process of spreading the internet and the idea of controlling and managing every device based on IP. The fact that IoT devices are interconnected with limited resources causes users to become vulnerable to internal and external attacks that threaten their security. In this study, a Flood attack, which is an important attack type against IoT networks, is discussed. Within the scope of the analysis of the study, first of all, the effect of the flood attack on the system has been examined. Subsequently, it has been focused on detecting the at-tack through the K-means algorithm, a machine learning algorithm. The analysis results have been shown that the attacking mote where the flood attack has been carried out has been successfully detected. In this way, similar flood attacks will be detected as soon as possible, and the system will be saved from the attack with the most damage and will be activated as soon as possible.\",\"PeriodicalId\":11622,\"journal\":{\"name\":\"El-Cezeri Fen ve Mühendislik Dergisi\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"El-Cezeri Fen ve Mühendislik Dergisi\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31202/ecjse.1149925\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"El-Cezeri Fen ve Mühendislik Dergisi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31202/ecjse.1149925","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着信息技术的发展,我们生活的每一个领域,从购物到教育,从健康到娱乐,都已经过渡到网络环境,被定义为数字环境。特别是物联网(IoT)的概念是在互联网的普及和基于IP控制和管理每一个设备的想法的过程中出现的。物联网设备与有限资源互联的事实导致用户容易受到威胁其安全的内部和外部攻击。本研究讨论了针对物联网网络的一种重要攻击类型——洪水攻击。在分析研究范围内,首先考察了洪水攻击对系统的影响。随后,它一直专注于通过K-means算法(一种机器学习算法)检测攻击。分析结果表明,成功检测出了进行洪水攻击的攻击点。这样可以在第一时间发现类似的洪水攻击,将系统从破坏最大的攻击中拯救出来,并在第一时间激活。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Novel Approach to Prevention of Hello Flood Attack in IoT Using Machine Learning Algorithm
With the developments in information technologies, every area of our lives, from shopping to education, from health to entertainment, has transitioned to the cyber environment, defined as the digital environment. In particular, the concept of the Internet of Things (IoT) has emerged in the process of spreading the internet and the idea of controlling and managing every device based on IP. The fact that IoT devices are interconnected with limited resources causes users to become vulnerable to internal and external attacks that threaten their security. In this study, a Flood attack, which is an important attack type against IoT networks, is discussed. Within the scope of the analysis of the study, first of all, the effect of the flood attack on the system has been examined. Subsequently, it has been focused on detecting the at-tack through the K-means algorithm, a machine learning algorithm. The analysis results have been shown that the attacking mote where the flood attack has been carried out has been successfully detected. In this way, similar flood attacks will be detected as soon as possible, and the system will be saved from the attack with the most damage and will be activated as soon as possible.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Human Robot Interaction with Social Humanoid Robots A Single Source Thirteen Level Switched Capacitor Boost Inverter for PV applications Yakınsak-Konik Nozulların Giriş ve Çıkış Çaplarının İtme Kuvveti ve Hacimsel Debi Üzerindeki Etkisinin Teorik, Nümerik ve Deneysel İncelemesi Zeytinyağı Üretim Atıklarının Yün Boyamacılığında Kullanım Olanaklarının Araştırılması Yer Tepki Analizlerinde Farklı Dinamik Kayma Modülü Yaklaşımları Kullanılarak Belirlenen Tepki Spektrumlarının Karşılaştırılması
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1