DDoS attack detection techniques in IoT networks: a survey
dc.authorscopusid | Ali Ghaffari / 57197223215 | |
dc.authorwosid | Ali Ghaffari / AAV-3651-2020 | |
dc.contributor.author | Pakmehr, Amir | |
dc.contributor.author | Aßmuth, Andreas | |
dc.contributor.author | Taheri, Negar | |
dc.contributor.author | Ghaffari, Ali | |
dc.date.accessioned | 2025-04-18T10:50:23Z | |
dc.date.available | 2025-04-18T10:50:23Z | |
dc.date.issued | 2024 | |
dc.department | İstinye Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü | |
dc.description.abstract | The Internet of Things (IoT) is a rapidly emerging technology that has become more valuable and vital in our daily lives. This technology enables connection and communication between objects and devices and allows these objects to exchange information and perform intelligent operations with each other. However, due to the scale of the network, the heterogeneity of the network, the insecurity of many of these devices, and privacy protection, it faces several challenges. In the last decade, distributed DDoS attacks in IoT networks have become one of the growing challenges that require serious attention and investigation. DDoS attacks take advantage of the limited resources available on IoT devices, which disrupts the functionality of IoT-connected applications and services. This article comprehensively examines the effects of DDoS attacks in the context of the IoT, which cause significant harm to existing systems. Also, this paper investigates several solutions to identify and deal with this type of attack. Finally, this study suggests a broad line of research in the field of IoT security, dedicated to examining how to adapt to current challenges and predicting future trends. © The Author(s) 2024. | |
dc.identifier.citation | Pakmehr, A., Aßmuth, A., Taheri, N., & Ghaffari, A. (2024). DDoS attack detection techniques in IoT networks: a survey. Cluster Computing, 27(10), 14637-14668. | |
dc.identifier.doi | 10.1007/s10586-024-04662-6 | |
dc.identifier.endpage | 14668 | |
dc.identifier.issn | 13867857 | |
dc.identifier.issue | 10 | |
dc.identifier.scopus | 2-s2.0-85199900143 | |
dc.identifier.scopusquality | Q1 | |
dc.identifier.startpage | 14637 | |
dc.identifier.uri | http://dx.doi.org/10.1007/s10586-024-04662-6 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/7209 | |
dc.identifier.volume | 27 | |
dc.identifier.wos | WOS:001276963700002 | |
dc.identifier.wosquality | Q1 | |
dc.indekslendigikaynak | Scopus | |
dc.institutionauthor | Ghaffari, Ali | |
dc.institutionauthorid | Ali Ghaffari / 0000-0001-5407-8629 | |
dc.language.iso | en | |
dc.publisher | Springer | |
dc.relation.ispartof | Cluster Computing | |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | |
dc.rights | info:eu-repo/semantics/closedAccess | |
dc.subject | DDoS | |
dc.subject | Internet of Things | |
dc.subject | Intrusion Detection | |
dc.subject | Machine Learning | |
dc.title | DDoS attack detection techniques in IoT networks: a survey | |
dc.type | Article |
Dosyalar
Lisans paketi
1 - 1 / 1
Küçük Resim Yok
- İsim:
- license.txt
- Boyut:
- 1.17 KB
- Biçim:
- Item-specific license agreed upon to submission
- Açıklama: