A Novel Approach to Prevention of Hello Flood Attack in IoT Using Machine Learning Algorithm
dc.authorscopusid | 57201743399 | |
dc.authorscopusid | 57447588400 | |
dc.authorscopusid | 57203142239 | |
dc.authorscopusid | 57773121800 | |
dc.authorscopusid | 56469924100 | |
dc.authorscopusid | 6504413319 | |
dc.authorscopusid | 57203142641 | |
dc.contributor.author | Gönen, Serkan | |
dc.contributor.author | Barişkan, Mehmet Ali | |
dc.contributor.author | Karacayilmaz, Gökçe | |
dc.contributor.author | Alhan, Birkan | |
dc.contributor.author | Yilmaz, Ercan Nurcan | |
dc.contributor.author | Artuner, Harun | |
dc.contributor.author | Sindiren, Erhan | |
dc.date.accessioned | 2024-09-11T19:58:12Z | |
dc.date.available | 2024-09-11T19:58:12Z | |
dc.date.issued | 2022 | |
dc.department | İstanbul Gelişim Üniversitesi | en_US |
dc.description.abstract | With the developments in information technologies, every area of our lives, from shopping to education, from health to entertainment, has transitioned to the cyber environment, defined as the digital environment. In particular, the concept of the Internet of Things (IoT) has emerged in the process of spreading the internet and the idea of controlling and managing every device based on IP. The fact that IoT devices are interconnected with limited resources causes users to become vulnerable to internal and external attacks that threaten their security. In this study, a Flood attack, which is an important attack type against IoT networks, is discussed. Within the scope of the analysis of the study, first of all, the effect of the flood attack on the system has been examined. Subsequently, it has been focused on detecting the at-tack through the K-means algorithm, a machine learning algorithm. The analysis results have been shown that the attacking mote where the flood attack has been carried out has been successfully detected. In this way, similar flood attacks will be detected as soon as possible, and the system will be saved from the attack with the most damage and will be activated as soon as possible. © 2022, TUBITAK. All rights reserved. | en_US |
dc.identifier.doi | 10.31202/ecjse.1149925 | |
dc.identifier.endpage | 1541 | en_US |
dc.identifier.issn | 2148-3736 | en_US |
dc.identifier.issue | 4 | en_US |
dc.identifier.scopus | 2-s2.0-85146780285 | en_US |
dc.identifier.scopusquality | Q4 | en_US |
dc.identifier.startpage | 1529 | en_US |
dc.identifier.uri | https://doi.org/10.31202/ecjse.1149925 | |
dc.identifier.uri | https://hdl.handle.net/11363/8442 | |
dc.identifier.volume | 9 | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | TUBITAK | en_US |
dc.relation.ispartof | El-Cezeri Journal of Science and Engineering | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.snmz | 20240903_G | en_US |
dc.subject | Cyber Security; Flood Attacks; IoT; IoT Security; Machine learning | en_US |
dc.title | A Novel Approach to Prevention of Hello Flood Attack in IoT Using Machine Learning Algorithm | en_US |
dc.title.alternative | Makine Öğrenmesi Algoritmasını Kullanarak IoT'de Hello Flood Saldırısının Önlenmesine Yönelik Yeni Bir Yaklaşım] | en_US |
dc.type | Article | en_US |