{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:30:51Z","timestamp":1772303451439,"version":"3.50.1"},"reference-count":29,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["NHM"],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:p xml:lang=\"fr\">&lt;abstract&gt;&lt;p&gt;A denial-of-service (DoS) attack aims to exhaust the resources of the victim by sending attack packets and ultimately stop the legitimate packets by various techniques. The paper discusses the consequences of distributed denial-of-service (DDoS) attacks in various application areas of Internet of Things (IoT). In this paper, we have analyzed the performance of machine learning(ML)-based classifiers including bagging and boosting techniques for the binary classification of attack traffic. For the analysis, we have used the benchmark CICDDoS2019 dataset which deals with DDoS attacks based on User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) in order to study new kinds of attacks. Since these protocols are widely used for communication in IoT networks, this data has been used for studying DDoS attacks in the IoT domain. Since the data is highly unbalanced, class balancing is done using an ensemble sampling approach comprising random under-sampler and ADAptive SYNthetic (ADASYN) oversampling technique. Feature selection is achieved using two methods, i.e., (a) Pearson correlation coefficient and (b) Extra Tree classifier. Further, performance is evaluated for ML classifiers viz. Random Forest (RF), Na\u00efve Bayes (NB), support vector machine (SVM), AdaBoost, eXtreme Gradient Boosting (XGBoost) and Gradient Boosting (GB) algorithms. It is found that RF has given the best performance with the least training and prediction time. Further, it is found that feature selection using extra trees classifier is more efficient as compared to the Pearson correlation coefficient method in terms of total time required in training and prediction for most classifiers. It is found that RF has given best performance with least time along with feature selection using Pearson correlation coefficient in attack detection.&lt;\/p&gt;&lt;\/abstract&gt;<\/jats:p>","DOI":"10.3934\/nhm.2023061","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T10:08:04Z","timestamp":1685009284000},"page":"1393-1409","source":"Crossref","is-referenced-by-count":10,"title":["Detection of DDoS attack in IoT traffic using ensemble machine learning techniques"],"prefix":"10.3934","volume":"18","author":[{"given":"Nimisha","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Pramod Kumar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/nhm.2023061-1","doi-asserted-by":"publisher","unstructured":"K. O. Adefemi Alimi, K. Ouahada, A. M. Abu-Mahfouz, S. Rimer, O. A. Alimi, Refined lstm based intrusion detection for denial-of-service attack in internet of things, <i>J. Sens. Actuator Networks<\/i>, <b>11<\/b> (2022), 32. https:\/\/doi.org\/10.3390\/jsan11030032","DOI":"10.3390\/jsan11030032"},{"key":"key-10.3934\/nhm.2023061-2","doi-asserted-by":"publisher","unstructured":"K. Alieyan, A. Almomani, M. Anbar, M. Alauthman, R. Abdullah, B. B. Gupta, Dns rule-based schema to botnet detection, <i>Enterp. Inf. Syst.<\/i>, <b>15<\/b> (2021), 545\u2013564. https:\/\/doi.org\/10.1080\/17517575.2019.1644673","DOI":"10.1080\/17517575.2019.1644673"},{"key":"key-10.3934\/nhm.2023061-3","doi-asserted-by":"publisher","unstructured":"A. Dahiya, B. B. Gupta, A reputation score policy and bayesian game theory based incentivized mechanism for ddos attacks mitigation and cyber defense, <i>Future Gener. Comput. Syst.<\/i>, <b>117<\/b> (2021), 193\u2013204. https:\/\/doi.org\/10.1016\/j.future.2020.11.027","DOI":"10.1016\/j.future.2020.11.027"},{"key":"key-10.3934\/nhm.2023061-4","doi-asserted-by":"publisher","unstructured":"M. V. de Assis, L. F. Carvalho, J. J. Rodrigues, J. Lloret, M. L. Proen\u00e7a Jr, Near real-time security system applied to sdn environments in IoT networks using convolutional neural network, <i>Comput. Electr. Eng.<\/i>, <b>86<\/b> (2020), 106738. https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106738","DOI":"10.1016\/j.compeleceng.2020.106738"},{"key":"key-10.3934\/nhm.2023061-5","doi-asserted-by":"publisher","unstructured":"R. K. Deka, D. K. Bhattacharyya, J. K. Kalita, Active learning to detect ddos attack using ranked features, <i>Comput. Commun.<\/i>, <b>145<\/b> (2019), 203\u2013222. https:\/\/doi.org\/10.1016\/j.comcom.2019.06.010","DOI":"10.1016\/j.comcom.2019.06.010"},{"key":"key-10.3934\/nhm.2023061-6","doi-asserted-by":"crossref","unstructured":"R. Doshi, N. Apthorpe, N. Feamster, Machine learning ddos detection for consumer internet of things devices, in <i>2018 IEEE Security and Privacy Workshops (SPW)<\/i>, IEEE, (2018), 29\u201335. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/SPW.2018.00013\">https:\/\/doi.org\/10.1109\/SPW.2018.00013<\/ext-link>","DOI":"10.1109\/SPW.2018.00013"},{"key":"key-10.3934\/nhm.2023061-7","doi-asserted-by":"publisher","unstructured":"V. Hassija, V. Chamola, V. Saxena and D. Jain, A survey on IoT security: application areas, security threats, and solution architectures, <i>IEEE Access<\/i>, <b>7<\/b> (2019), 82721\u201382743. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"key-10.3934\/nhm.2023061-8","doi-asserted-by":"publisher","unstructured":"T. Horak, P. Strelec, L. Huraj, P. Tanuska, A. Vaclavova, M. Kebisek, The vulnerability of the production line using industrial Iot systems under DDoS attack, <i>Electronics<\/i>, <b>10<\/b> (2021), 381. https:\/\/doi.org\/10.3390\/electronics10040381","DOI":"10.3390\/electronics10040381"},{"key":"key-10.3934\/nhm.2023061-9","doi-asserted-by":"publisher","unstructured":"S. Hosseini, M. Azizi, The hybrid technique for DDoS detection with supervised learning algorithms, <i>Comput. Net.<\/i>, <b>158<\/b> (2019), 35\u201345. https:\/\/doi.org\/10.1016\/j.comnet.2019.04.027","DOI":"10.1016\/j.comnet.2019.04.027"},{"key":"key-10.3934\/nhm.2023061-10","doi-asserted-by":"publisher","unstructured":"L. Huraj, M. \u0160imon, T. Hor\u00e1k, Resistance of IoT sensors against DDoS attack in smart home environment, <i>Sensors<\/i>, <b>20<\/b> (2020), 1\u201323. https:\/\/doi.org\/10.3390\/s20185298","DOI":"10.3390\/s20185298"},{"key":"key-10.3934\/nhm.2023061-11","doi-asserted-by":"crossref","unstructured":"F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, G. A. Shah, IoT DoS and DDoS attack detection using ResNet, in <i>2020 IEEE 23rd International Multitopic Conference (INMIC)<\/i>, IEEE, 2020. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/INMIC50486.2020.9318216\">https:\/\/doi.org\/10.1109\/INMIC50486.2020.9318216<\/ext-link>","DOI":"10.1109\/INMIC50486.2020.9318216"},{"key":"key-10.3934\/nhm.2023061-12","doi-asserted-by":"publisher","unstructured":"M. Idhammad, K. Afdel, M. Belouch, Detection system of HTTP DDoS attacks in a Cloud environment based on Information Theoretic Entropy and Random Forest, <i>Secur. Commun. Net.<\/i>, <b>2018<\/b> (2018), 1\u201313. https:\/\/doi.org\/10.1155\/2018\/1263123","DOI":"10.1155\/2018\/1263123"},{"key":"key-10.3934\/nhm.2023061-13","doi-asserted-by":"publisher","unstructured":"Y. Jung, Hybrid-aware model for senior wellness service in smart home, <i>Sensors<\/i>, <b>17<\/b> (2017). https:\/\/doi.org\/10.3390\/s17051182","DOI":"10.3390\/s17051182"},{"key":"key-10.3934\/nhm.2023061-14","doi-asserted-by":"crossref","unstructured":"A. Koay, A. Chen, I. Welch, W. K. Seah, A new multi classifier system using entropy-based features in DDoS attack detection, in <i>2018 International Conference on Information Networking (ICOIN)<\/i>, (2018), 162\u2013167. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/ICOIN.2018.8343104\">https:\/\/doi.org\/10.1109\/ICOIN.2018.8343104<\/ext-link>","DOI":"10.1109\/ICOIN.2018.8343104"},{"key":"key-10.3934\/nhm.2023061-15","doi-asserted-by":"publisher","unstructured":"M. A. Lawal, R. A. Shaikh, S. R. Hassan, A DDoS attack mitigation framework for IoT networks using fog computing, <i>Procedia Comput. Sci.<\/i>, <b>182<\/b> (2021), 13\u201320. https:\/\/doi.org\/10.1016\/j.procs.2021.02.003","DOI":"10.1016\/j.procs.2021.02.003"},{"key":"key-10.3934\/nhm.2023061-16","doi-asserted-by":"crossref","unstructured":"F. S. d. Lima Filho, F. A. Silveira, A. de Medeiros Brito Junior, G. Vargas-Solar, L. F. Silveira, Smart detection: an online approach for dos\/ddos attack detection using machine learning, <i>Secur. Commun. Net.<\/i>, 2019.","DOI":"10.1155\/2019\/1574749"},{"key":"key-10.3934\/nhm.2023061-17","doi-asserted-by":"publisher","unstructured":"L. Liu, E. Stroulia, I. Nikolaidis, A. Miguel-Cruz, A. Rios Rincon, Smart homes and home health monitoring technologies for older adults: A systematic review, <i>Int. J. Med. Inf.<\/i>, <b>91<\/b> (2016), 44\u201359. https:\/\/doi.org\/10.1016\/j.ijmedinf.2016.04.007","DOI":"10.1016\/j.ijmedinf.2016.04.007"},{"key":"key-10.3934\/nhm.2023061-18","doi-asserted-by":"crossref","unstructured":"C. D. McDermott, F. Majdani, A. V. Petrovski, Botnet detection in the Internet of Things using deep learning approaches, in <i>2018 International Joint Conference on Neural Networks (IJCNN)<\/i>, (2018), 1\u20138. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"http:\/\/dx.doi.org\/10.1109\/IJCNN.2018.8489489\">http:\/\/dx.doi.org\/10.1109\/IJCNN.2018.8489489<\/ext-link>","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"key-10.3934\/nhm.2023061-19","doi-asserted-by":"publisher","unstructured":"Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, et al., N-baiot\u2014network-based detection of Iot botnet attacks using deep autoencoders, <i>IEEE Pervas. Comput.<\/i>, <b>17<\/b> (2018), 12\u201322. http:\/\/dx.doi.org\/10.1109\/MPRV.2018.03367731","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"key-10.3934\/nhm.2023061-20","doi-asserted-by":"publisher","unstructured":"A. Mishra, N. Gupta, B. B. Gupta, Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms, <i>Telecommun. Sys.<\/i>, <b>82<\/b> (2023), 229\u2013244. https:\/\/doi.org\/10.1007\/s11235-022-00981-4","DOI":"10.1007\/s11235-022-00981-4"},{"key":"key-10.3934\/nhm.2023061-21","doi-asserted-by":"publisher","unstructured":"L. Nauha, N. S. Ker\u00e4nen, M. Kangas, T. J\u00e4ms\u00e4, J. Reponen, Assistive technologies at home for people with a memory disorder, <i>Dementia<\/i>, <b>17<\/b> (2018), 909\u2013923. https:\/\/doi.org\/10.1177\/1471301216674816","DOI":"10.1177\/1471301216674816"},{"key":"key-10.3934\/nhm.2023061-22","doi-asserted-by":"crossref","unstructured":"N. Pandey, P. K. Mishra, Taxonomy of DDoS attacks and their defense mechanisms in IoT, <i>J. Sci. Res.<\/i>, <b>65<\/b> (2021), 197\u2013207.","DOI":"10.37398\/JSR.2021.650523"},{"key":"key-10.3934\/nhm.2023061-23","doi-asserted-by":"crossref","unstructured":"R. Paudel, T. Muncy, W. Eberle, Detecting DoS attack in Smart Home IoT devices using a graph-based approach, in <i>2019 IEEE International Conference on Big Data (Big Data)<\/i>, (2019), 5249\u20135258. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/BigData47090.2019.9006156\">https:\/\/doi.org\/10.1109\/BigData47090.2019.9006156<\/ext-link>","DOI":"10.1109\/BigData47090.2019.9006156"},{"key":"key-10.3934\/nhm.2023061-24","doi-asserted-by":"publisher","unstructured":"M. S. E. Shahabadi, H. Tabrizchi, M. K. Rafsanjani, B. Gupta, F. Palmieri, A combination of clustering-based under-sampling with ensemble methods for solving imbalanced class problem in intelligent systems, <i>Technol. Forecast. Soc. Change<\/i>, <b>169<\/b> (2021), 120796. https:\/\/doi.org\/10.1016\/j.techfore.2021.120796","DOI":"10.1016\/j.techfore.2021.120796"},{"key":"key-10.3934\/nhm.2023061-25","doi-asserted-by":"crossref","unstructured":"I. Sharafaldin, A. H. Lashkari, S. Hakak, A. A. Ghorbani, Developing realistic Distributed Denial of Service (DDoS) attack dataset and taxonomy, in <i>2019 International Carnahan Conference on Security Technology (ICCST)<\/i>, IEEE, (2019), 1\u20138. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/CCST.2019.8888419\">https:\/\/doi.org\/10.1109\/CCST.2019.8888419<\/ext-link>","DOI":"10.1109\/CCST.2019.8888419"},{"key":"key-10.3934\/nhm.2023061-26","doi-asserted-by":"crossref","unstructured":"D. H. Summerville, K. M. Zach, Y. Chen, Ultra-lightweight deep packet anomaly detection for Internet of things devices, in <i>2015 IEEE 34th international performance computing and communications conference (IPCCC)<\/i>, IEEE, (2015), 1\u20138. <ext-link ext-link-type=\"uri\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/doi.org\/10.1109\/PCCC.2015.7410342\">https:\/\/doi.org\/10.1109\/PCCC.2015.7410342<\/ext-link>","DOI":"10.1109\/PCCC.2015.7410342"},{"key":"key-10.3934\/nhm.2023061-27","doi-asserted-by":"publisher","unstructured":"R. Turjamaa, A. Pehkonen, M. Kangasniemi, How smart homes are used to support older people: an integrative review, <i>Int. J. Older People Nurs.<\/i>, <b>14<\/b> (2019), 1\u201315. https:\/\/doi.org\/10.1111\/opn.12260","DOI":"10.1111\/opn.12260"},{"key":"key-10.3934\/nhm.2023061-28","doi-asserted-by":"crossref","unstructured":"D. Uckelmann, A definition approach to smart logistics, in <i>International Conference on Next Generation Wired\/Wireless Networking<\/i>, Springer, (2008), 273\u2013284.","DOI":"10.1007\/978-3-540-85500-2_28"},{"key":"key-10.3934\/nhm.2023061-29","doi-asserted-by":"publisher","unstructured":"A. Uprety, D. B. Rawat, Reinforcement learning for IoT security: a comprehensive survey, <i>IEEE Int. Thing. J.<\/i>, <b>4662<\/b> (2020), 1\u201314. https:\/\/doi.org\/10.1109\/JIOT.2020.3040957","DOI":"10.1109\/JIOT.2020.3040957"}],"container-title":["Networks and Heterogeneous Media"],"original-title":[],"link":[{"URL":"http:\/\/www.aimspress.com\/article\/doi\/10.3934\/nhm.2023061?viewType=html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T08:17:58Z","timestamp":1685348278000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.aimspress.com\/article\/doi\/10.3934\/nhm.2023061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.3934\/nhm.2023061","relation":{},"ISSN":["1556-1801"],"issn-type":[{"value":"1556-1801","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}