Machaka, PNelwamondo, Fulufhelo V2017-01-182017-01-182016-08Machaka, P. and Nelwamondo, F. 2016. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey. In: Data Mining Trends and Applications in Criminal Science and Investigations. IGI Global: Hershey, Pennsylvania9781522504634http://www.igi-global.com/chapter/data-mining-techniques-for-distributed-denial-of-service-attacks-detection-in-the-internet-of-things/157463http://hdl.handle.net/10204/8919Copyright: 2016 IGI Global: Hershey, Pennsylvania. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website.This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.enData miningInternet of thingsIoTDistributed Denial of ServiceDDoSData mining techniques for distributed denial of service attacks detection in the internet of things: A research surveyBook ChapterMachaka, P., & Nelwamondo, F. V. (2016). Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey., <i>Wokflow;17455</i> IGI Global. http://hdl.handle.net/10204/8919Machaka, P, and Fulufhelo V Nelwamondo. "Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey" In <i>WOKFLOW;17455</i>, n.p.: IGI Global. 2016. http://hdl.handle.net/10204/8919.Machaka P, Nelwamondo FV. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey.. Wokflow;17455. [place unknown]: IGI Global; 2016. [cited yyyy month dd]. http://hdl.handle.net/10204/8919.TY - Book Chapter AU - Machaka, P AU - Nelwamondo, Fulufhelo V AB - This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided. DA - 2016-08 DB - ResearchSpace DP - CSIR KW - Data mining KW - Internet of things KW - IoT KW - Distributed Denial of Service KW - DDoS LK - https://researchspace.csir.co.za PY - 2016 SM - 9781522504634 T1 - Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey TI - Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey UR - http://hdl.handle.net/10204/8919 ER -