You are on page 1of 1

IoT is growing at a rapid pace, involving sectors and domains that were previously not considered.

This includes but is not limited to factories, agriculture, cities, and transportation. This wide
exploitation of IoT technology and its rapid adaption in a wide variety of sectors poses many security
challenges and issues. On of these is the DDoS attack that affects the availability of resources,
resulting in an adverse financial impact. This thesis presents an intelligent framework for DDoS
attack detection using machine learning, which addresses the issue of the lack of a dataset for
machine learning evolution and explores three DDoS attacks in IoT, namely selective forwarding,
blackhole and the flooding attack.

Security is a crucial element in determining how the IoT network and devices will help shape our
future. One of IoT’s most significant security challenges is how to detect DDoS attacks without
compromising the limitations associated with IoT devices. This systematic literature review has
presented a comprehensive survey of the current DDoS attack detection approach, and we have
identified the attacks associated with DDoS that affect the availability of the network. Furthermore,
in addition to exploring the limitations associated with the detection approach, we have identified
aspects that should be considered when designing IoT security solutions. We evaluated the
proposed solutions to DDoS attacks in terms of practicality in real-world scenarios. In the next
chapter, the limitation derived from this systematic review will be used to form the research
questions and objectives.

This chapter has described the gaps and limitations in the literature related to DDoS detection in IoT.
The terms and concepts used to design, implement, and evaluate the proposed framework are
defined in this chapter in section 3.2. Furthermore, a precise definition of the problem is identified in
relation to this thesis. To further investigate the defined problem, it was divided into four research
questions. Finally, the research methodology used is described and detailed, corresponding to our
research objective. In the next chapter, a brief overview of the proposed framework and the solution
for the related research questions is explained.

You might also like