Thursday, April 17, 2025
HomeBotnetResearchers Use Machine Learning to Create Real-time IoT DDoS Detection Tool to...

Researchers Use Machine Learning to Create Real-time IoT DDoS Detection Tool to Block Attack Traffic from IoT Botnets

Published on

SIEM as a Service

Follow Us on Google News

Researchers using Machine learning as a new technique to create a Real-Time Internet of Things(IoT) DDoS detection tool to prevent the DDoS attack from IoT botnets.

IoT botnet attacks are dramatically increasing and conduct distributed denial of service (DDoS) on Internet infrastructure in recent years by various botnets families such as Mirai, HNS,Doubledoor.

Advanced IoT Botnet attacks are bypassing an IoT layered security that leads to taking complete control of the targeting network systems and attackers always find the many ways to bypass it.

- Advertisement - Google News

Researchers using Machine learning techniques to develop a new  IoT DDoS Detection Tool to detect the suspicious DDoS traffic in real time.

Real-Time DDOS detection tool will perform based on the IoT network behavior such as regular time interval between packets.

In this case, Variety of machine Learning algorithm such as neural networks will be implemented with this tool for high accuracy DDoS detection in IoT network traffic.

This Technique will effectively work for home gateway routers or other network middleboxes to could automatically detect local IoT device sources of DDoS attacks.

Also, at the same time, it works with low-cost machine learning algorithms and traffic data
that is based on the Traffic Flow.

Also, Researchers develop a machine learning pipeline in order to collect the data feature extraction and binary classification for IoT traffic DDoS detection.

machine learning pipeline

Researchers concentrate with two backgrounds to detect IoT Based DDoS Attack

1.Network Anomaly Detection 

Anomaly detection aims to identify patterns in data that do not conform to expected behavior. In the context of this research, anomaly detection techniques may be used to discern attack traffic from regular traffic

2.Network Middlebox Limitations

Network middleboxes have limited memory and processing power, imposing constraints on the algorithmic techniques used for anomaly detection.

Researchers explained in their Research Paper, Our classifiers successfully identify attack traffic with an accuracy higher than 0.999,” the team writes. “We found that random forest, K-nearest neighbors, and neural net classifiers were particularly effective. We expect that deep learning classifiers will continue to be effective with additional data from real-world deployments.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video...

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices,...