ResearchSpace

Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey

Show simple item record

dc.contributor.author Machaka, P
dc.contributor.author Nelwamondo, Fulufhelo V
dc.date.accessioned 2017-01-18T12:46:48Z
dc.date.available 2017-01-18T12:46:48Z
dc.date.issued 2016-08
dc.identifier.citation Machaka, P. and Nelwamondo, F. 2016. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey. In: Data Mining Trends and Applications in Criminal Science and Investigations. IGI Global: Hershey, Pennsylvania en_US
dc.identifier.isbn 9781522504634
dc.identifier.uri http://www.igi-global.com/chapter/data-mining-techniques-for-distributed-denial-of-service-attacks-detection-in-the-internet-of-things/157463
dc.identifier.uri http://hdl.handle.net/10204/8919
dc.description Copyright: 2016 IGI Global: Hershey, Pennsylvania. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. en_US
dc.description.abstract This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided. en_US
dc.language.iso en en_US
dc.publisher IGI Global en_US
dc.relation.ispartofseries Wokflow;17455
dc.subject Data mining en_US
dc.subject Internet of things en_US
dc.subject IoT en_US
dc.subject Distributed Denial of Service en_US
dc.subject DDoS en_US
dc.title Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey en_US
dc.type Book Chapter en_US
dc.identifier.apacitation Machaka, P., & Nelwamondo, F. V. (2016). Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey., <i>Wokflow;17455</i> IGI Global. http://hdl.handle.net/10204/8919 en_ZA
dc.identifier.chicagocitation Machaka, P, and Fulufhelo V Nelwamondo. "Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey" In <i>WOKFLOW;17455</i>, n.p.: IGI Global. 2016. http://hdl.handle.net/10204/8919. en_ZA
dc.identifier.vancouvercitation Machaka P, Nelwamondo FV. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey.. Wokflow;17455. [place unknown]: IGI Global; 2016. [cited yyyy month dd]. http://hdl.handle.net/10204/8919. en_ZA
dc.identifier.ris TY - Book Chapter AU - Machaka, P AU - Nelwamondo, Fulufhelo V AB - This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided. DA - 2016-08 DB - ResearchSpace DP - CSIR KW - Data mining KW - Internet of things KW - IoT KW - Distributed Denial of Service KW - DDoS LK - https://researchspace.csir.co.za PY - 2016 SM - 9781522504634 T1 - Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey TI - Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey UR - http://hdl.handle.net/10204/8919 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record