dc.contributor.author |
Machaka, P
|
|
dc.contributor.author |
Nelwamondo, Fulufhelo V
|
|
dc.date.accessioned |
2017-01-18T12:46:48Z |
|
dc.date.available |
2017-01-18T12:46:48Z |
|
dc.date.issued |
2016-08 |
|
dc.identifier.citation |
Machaka, P. and Nelwamondo, F. 2016. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey. In: Data Mining Trends and Applications in Criminal Science and Investigations. IGI Global: Hershey, Pennsylvania |
en_US |
dc.identifier.isbn |
9781522504634 |
|
dc.identifier.uri |
http://www.igi-global.com/chapter/data-mining-techniques-for-distributed-denial-of-service-attacks-detection-in-the-internet-of-things/157463
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/8919
|
|
dc.description |
Copyright: 2016 IGI Global: Hershey, Pennsylvania. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. |
en_US |
dc.description.abstract |
This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IGI Global |
en_US |
dc.relation.ispartofseries |
Wokflow;17455 |
|
dc.subject |
Data mining |
en_US |
dc.subject |
Internet of things |
en_US |
dc.subject |
IoT |
en_US |
dc.subject |
Distributed Denial of Service |
en_US |
dc.subject |
DDoS |
en_US |
dc.title |
Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey |
en_US |
dc.type |
Book Chapter |
en_US |
dc.identifier.apacitation |
Machaka, P., & Nelwamondo, F. V. (2016). Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey., <i>Wokflow;17455</i> IGI Global. http://hdl.handle.net/10204/8919 |
en_ZA |
dc.identifier.chicagocitation |
Machaka, P, and Fulufhelo V Nelwamondo. "Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey" In <i>WOKFLOW;17455</i>, n.p.: IGI Global. 2016. http://hdl.handle.net/10204/8919. |
en_ZA |
dc.identifier.vancouvercitation |
Machaka P, Nelwamondo FV. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey.. Wokflow;17455. [place unknown]: IGI Global; 2016. [cited yyyy month dd]. http://hdl.handle.net/10204/8919. |
en_ZA |
dc.identifier.ris |
TY - Book Chapter
AU - Machaka, P
AU - Nelwamondo, Fulufhelo V
AB - This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.
DA - 2016-08
DB - ResearchSpace
DP - CSIR
KW - Data mining
KW - Internet of things
KW - IoT
KW - Distributed Denial of Service
KW - DDoS
LK - https://researchspace.csir.co.za
PY - 2016
SM - 9781522504634
T1 - Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey
TI - Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey
UR - http://hdl.handle.net/10204/8919
ER -
|
en_ZA |