You are currently viewing a new version of our website. To view the old version click .
Future Internet
  • Article
  • Open Access

23 September 2025

Minimal Overhead Modelling of Slow DoS Attack Detection for Resource-Constrained IoT Networks

,
and
School of Computing and Communications, The Open University, Milton Keynes MK7 6AA, UK
*
Author to whom correspondence should be addressed.

Abstract

The increasing deployment of internet of things(IoT) systems across critical domains has broadened the threat landscape, and being the catalyst for a variety of security concerns, including very stealthy slow denial of service (slow DoS) attacks. These exploit the hypertext transfer protocol’s (HTTP) application-layer protocol to either close down service requests or degrade responsiveness while closely mimicking legitimate traffic. Current available datasets fail to capture the more stealthy operational profiles of slow DoS attacks or account for the presence of genuine slow nodes (SN), which are devices experiencing high latency. These can significantly degrade detection accuracy since slow DoS attacks closely emulate SN. This paper addresses these problems by synthesising a realistic HTTP slow DoS dataset derived from a live IoT network, that incorporates both stealth-tuned slow DoS traffic and legitimate SN traffic, with the three main slow DoS variants of slow GET, slow Read, and slow POST being critically evaluated under these network conditions. A limited packet capture (LPC) strategy is adopted which focuses on just two metadata attributes, namely packet length ( l p ) and packet inter-arrival time ( Δ t ). Using a resource lightweight decision tree classifier, the proposed model achieves over 96% accuracy while incurring minimal computational overheads. Experimental results in a live IoT network reveal the negative classification impact of including SN traffic, thereby underscoring the importance of modelling stealthy attacks and SN latency in any slow DoS detection framework. Finally, a MPerf (Modelling Performance) is presented which quantifies and balances detection accuracy against processing costs to facilitate scalable deployment of low-cost detection models in resource-constrained IoT networks. This represents a practical solution to improving IoT resilience against stealthy slow DoS attacks whilst pragmatically balancing the resource-constraints of IoT nodes. By analysing the impact of SN on detection performance, a robust reliable model has been developed which can both measure and fine tune the accuracy-efficiency nexus.

1. Introduction

The rapid proliferation of the IoT has transformed industries and daily life, providing the potential for new and profitable innovation in commercial, industrial, agricultural, clinical, and recreational domains. As IoT applications increasingly adopt semi and fully autonomous functionalities, they are seen by many to offer new capabilities in personalised e-health care services [1], remote sensing, data processing, and sharing through networks of low-cost, interconnected nodes. This evolving paradigm is seen as the driver of continued growth in smart cities and automation [2], supporting integration of IoT technologies that underpins the next generation of industrial IoT (IIoT) systems [3]. The continued expansion in this domain is highlighted in [4], where the authors predicted that the number of IoT nodes could rise to 40 billion by 2030. This pervasive growth of IoT adoption brings inherent security risks as many of the mass-produced low-resource IoT nodes lack security and protective features, as a result of low production cost and their inherently limited form factor. In [5], these risks to IoT are highlighted in terms of threats to IoT nodes from Botnets, and in particular the distributed denial of service (DDoS) problem. The limited resources of IoT nodes make them vulnerable to physical and cyber threats [2], furthermore, inadequate awareness and education among IoT stakeholders increases the risk of malicious activity targeting the IoT network, the data in transit, and their applications. Recently, slow HTTP DoS attacks, often referred to as low rate or slow denial of service (slow DoS), have received the attention of researchers and, as noted by [6,7], are acutely problematic for current detection methodologies due to their ability to resemble legitimate hypertext transfer protocol (HTTP) and transmission control protocol (TCP) communications. Slow DoS attacks, as discussed in [8], are a stark contrast to high bandwidth, and high traffic volume botnet attacks such as the well documented Mirai attack [9], requiring minimal bandwidth. The slow DoS attack can be executed from a single low-resource device, such as a smartphone, tablet, webcam, or other IoT node. An important characteristic of slow DoS attacks is their apparent ease of operation, as they can be executed by a single malicious node utilising minimal bandwidth or computational resources, yet still capable of significantly hindering or interrupting the functionality of an IoT node [10]. Many modern detection models require a substantial amount of network packets for their analysis, making these methods excessively resource-intensive for IoT nodes and networks. Addressing the slow DoS issue is highly complex and warrants a thorough examination, particularly within the highly resource-constrained IoT network environment. The challenge of accurately identifying slow DoS attacks becomes exacerbated under conditions of significant network latency, leading to delayed transmissions for legitimate nodes. This is a prevalent issue in many modern datasets, which existing detection models often fail to adequately address. Through the examination of legitimate nodes that exhibit slow or suboptimal connectivity in conjunction with sophisticated and highly stealthy slow DoS attack traffic, this study considers the operational cost while providing efficient detection for three of the most significant slow DoS attacks. This is an important motivational aspect of this research, given that contemporary detection models focus on overall accuracy, omitting to measure this in the context of processing overhead placed on the IoT detection node.
The paper also presents a performance model that can be adapted to offer appropriate detection accuracy in highly resource-constrained IoT networks. This differentiation is achieved by implementing a lightweight yet efficient decision tree classification approach [11] focused on only two network attributes, leading to a substantial reduction in the resource requirements of an IoT node, which is achieved by using a lightweight, and efficient approach by limiting the volume of packets for capture and analysis. In [12], the decision tree classifier was found to offer the fastest operating time compared to four other lightweight machine learning (ML) classifiers, while in [13], both efficiency and accuracy were seen as characteristic of this classifier. Hence, the work presented here leverages these findings and uses the decision tree as an efficient and well tested classifier, allowing for a fair comparison to other ML proposals and reproducible analysis.
This research makes several significant original contributions to slow DoS detection in resource-constrained IoT scenarios:
  • A lightweight resource-efficient slow DoS detection model.
  • Minimal processing overheads compared to alternative models that require large datasets and bi-directional packet capture.
  • Model efficiency utilising a computationally lightweight decision tree classifier.
  • A robust evaluation environment using non-default attack parameters.
  • Critical impact analysis of the role of genuine SN in detection performance.
  • Resource cost modelling to balance accuracy and efficiency.
The remainder of this paper is organised as follows. Section 2 defines the problem domain, while in Section 3 the three main slow DoS variants are introduced. In Section 4, the evaluation environment is explained and key terms established. Section 5 presents a critical results analysis and a discussion of the slow DoS detection approach, while Section 6 proposes a cost model that balances intrusion detection accuracy with processing overhead. Section 7 makes some concluding remarks and future work directions.

3. The Three Slow DoS Variants

The three key variants of slow DoS have attracted considerable interest from researchers. However, most current studies tend to examine each variant separately, and few adopt an integrated approach to the issue. In this paper, the focus is on a generalised lightweight detection model that targets the following three key slow DoS variants.

3.1. Slow GET (SG)

Slow GET is a variant of slow DoS attack that takes advantage of unfinished HTTP requests to drain server resources. Slowloris is a prominent example of this tactic, focusing on incomplete HTTP headers to maintain open connections. In this mode of attack, the malicious node (MN) transmits partial HTTP GET requests to the server, prolonging open connections. Without receiving a complete request, the server remains in a constant waiting state, occupying resources, resulting in the server’s failure to accept a complete request. The inability to serve additional requests from legitimate nodes (LN), results in a successful DoS. A typical attack profile is illustrated in Figure 1, highlighting the multiple incomplete HTTP GET requests and the subsequent server timeout.
Figure 1. A slow HTTP GET attack process.

3.2. Slow Read (SR)

The slow Read attack exploits the adjustable TCP window size attribute. This window size, shared by communicating nodes, sets the maximum receive data (in bytes) that can reside in the read buffer in a TCP connection. The size of the TCP window offers a reliable way to regulate the flow of data across the network. An MN may send a valid HTTP request using TCP, and the server accepts the size of the TCP window. The MN can set a large window size, which the server respond to; however, the MN will proceed to read data, slowly, thus holding open the server connection. Sending multiple malicious read requests will use up all available server resources, leading to a DoS.

3.3. Slow POST (SP) (aka R.U.Dead.Yet)

Slow POST represents another form of slow DoS attack, in which the MN initiates server connections with the aim of keeping them active for an extended period by pretending to send data [35]. The MN issues an HTTP POST request, prompting the server to allocate space for the client. The request includes the content length field, which specifies the volume of data to be transferred. This typically large value enables the server to reserve enough memory to handle the anticipated data size. Despite this, the MN sends the POST data in the message body to the server at a very slow pace, possibly one byte per minute, forcing the server to wait until all the expected data arrive or the timeout limit is reached. Note, both slow GET and slow POST are recognised as HTTP operational methods, so are written in capitals, unlike slow Read, which defines the mode of attack.

3.4. Slow DoS Detection Issues

In mission critical IoT networks, such as medical IoT systems that monitor vital patient data or agricultural IoT networks that control automated sensing operations, every millisecond matters. Connectivity issues, such as high latency or intermittent wireless signals can create potentially fatal or costly disruptions.
A critical observation across all three slow DoS attack variants is their ability to convincingly mimic legitimate HTTP over TCP communications. This covert behaviour makes it imperative to measure and compare the traffic patterns of these attack vectors against legitimate nodes, especially those whose slow performance stems from genuine high latency and suboptimal connectivity.
Another aspect that compounds the difficulty of slow DoS detection is that attacks can operate even with an encryption overlay [30]. As such, transport layer encryption mechanisms such as HTTPS (secure HTTP) and the use of transport layer security (TLS) are ineffective because they secure data in transit without inspecting application layer behaviour. This enables malicious clients to establish encrypted connections and execute resource exhausting strategies under the guise of legitimate traffic. Given that end-to-end encryption does not affect the operational parameters of the application layer protocol, it can be cogently argued the underlying network packet attributes and their numeric values remain constant for both HTTP and HTTPS [30]. To validate this judgment, HTTPS was configured for evaluation purposes in the live IoT network, and it was observed that the various network attributes corresponding to the packet metadata retained the same values relative to the packets when using unencrypted HTTP.
To appreciate the operational dynamics of slow DoS attacks, this work realised an experimental setup that went beyond standard practices. Not only were LN incorporated into the live IoT network, but also SN, which are genuine IoT nodes with high latency connections. This novel strategy provided valuable information for discriminating between legitimate and malicious connections in the presence of the three slow DoS variants, by comparing both LN and SN, which are indicative of highly stochastic wireless or cellular networks. Table 1 visualises the work carried out to address the slow DoS problem, highlighting the limitations within this research domain.
Table 1. Overview and constraints of contemporary slow DoS research.

4. Research Methods

A live IoT network was constructed to simulate an IoT network in which external nodes request sensor data via HTTP.
There are two Cisco 2800 series routers in the network, with the first acting as the IoT gateway or border router, and the second being the internet service router. Each router is equipped with a serial interface connected to the 10.10.10.0/30 subnet, which emulates a WAN (Wide Area Network) link. both routers use the routing information protocol (RIP) to enable packet routing between the networks and their respective nodes. Figure 2, shows the physical topology of the live IoT network, including sensor nodes, LN, SN, and MN along with intermediary network devices.
Figure 2. Physical topology of the IoT network.
To produce a substantial amount of genuine web traffic, the implementation of virtual clients was achieved through the JMeter application. JMeter is an Apache developed tool for monitoring web server load balancing and performance, widely used in both commercial projects and academic investigations [43,44]. The network is configured with differing node latencies and non-default slow DoS attack parameters to create highly stealthy attack profiles. Each node, designated as LN, SN, or MN (responsible for launching the slow DoS attacks), is represented by Raspberry Pi model 4 boards. The test results for the slow DoS attacks are presented in Table 2 which indicates a successful DoS (✓) and the duration of each attack prevents legitimate access to the web services of the target node.
Table 2. Slow DoS attack results and duration to web service (s).
The Apache web service was configured on a Raspberry Pi Model 4 board to function as the HTTP web interface, utilising standard security settings and operational parameters. Ubuntu Server 20.04.1 LTS is installed on the node serving as a minimalistic operating system on which the Apache 2.4 web server is deployed using standard installation procedures and security configurations. Within this environment, the web server is set to permit a maximum of C w s = 150 concurrent connections, a parameter specified by the Apache directive MaxRequestWorkers [45].
Raspberry Pi boards are commonly deployed in IoT networks for analytical purposes, as evidenced in [46,47]. A conceptual illustration of the live IoT network, indicating traffic type and flow is shown in Figure 3.
Figure 3. A conceptual illustration of the live IoT environment.
The live IoT network contained various nodes, including a DHT22 for humidity sensing, a TME probe for critical temperature monitoring with alerts, and a Papago 2TH thermocouple for WiFi based humidity and dew point measurements. These sensors support real-time data retrieval via HTTP GET, with the TME also offering XML data via HTTP POST. Although both the 2TH and the TME sensor nodes have the data transfer functionality of both HTTP and MQTT, HTTP is configured as the default application, thus requiring the network administrator or operator to manually reconfigure each node for MQTT. As HTTP is the default application interface setting, these nodes are particularly vulnerable to slow DoS attacks. The limitations in terms of the resource capacity of the IoT nodes are shown in Table 3, which clearly reflects the restrictions in terms of RAM and flash memory when considering the implementation of the security and intrusion detection mechanisms.
Table 3. Web server IoT sensor node details.
Dataset creation and subsequent data collection were performed using Wireshark, a widely recognised network packet inspection tool [28]. Wireshark captures and filters packets from each node, facilitating live dataset creation, which consists of Wireshark trace files in the standard .PCAPNG (Packet Capture Next Generation) format, and later converted to a .CSV file. Wireshark was set to listening mode on the monitoring node’s network interface, facilitating the extraction of the necessary packets, focusing on the packet length ( l p ), and packet inter-arrival time, or delta time ( Δ t ) attribute for analysis. The dataset compiled from the live IoT network is termed the HTTP slow DoS dataset and though commonly referred to as features in ML contexts, this paper uses the term attributes to emphasise their origin as native or derived properties of TCP/IP packets, which is the parlance of users of network packet analysers like Wireshark.

4.1. Comparison of Datasets

To present a fair and balanced evaluation, both the HTTP slow DoS [48], and CIC-IoT dataset 2023 [49] are used to compare attribute values of inbound HTTP traffic from MN and LN, and uniquely in [48] legitimate SN. The introduction of highly stealthy slow DoS traffic was an important inclusion, given no publicly available datasets currently go beyond the default slow DoS attack parameters. This weakness is highlighted in [50] where the authors state in their critique of ML with public datasets that models trained to detect slow DoS may be ineffective against weaker or less overt variations of the same attack.
In this paper the term FPC, and inbound-only refer to bi-directional and uni-directional packet capture respectively, and LPC requires a select number of uni-directional packets. LPC is a considerably more resource efficient as the focus is on a prescribed dataset comprising only the two network attributes l p and Δ t , where Δ t is defined by Equation (1).
Δ t = t a k 1 t s k
If t a k and t s k respectively denote the observed arrival and start times of the k t h packet, then Equation (1) represents the lapsed duration between packets in a TCP exchange.
The second attribute extracted for analysis is lp. This also provides an effective method for identifying unusual behaviour at a packet level. The packet header consists of fields crucial to routing IP packets through the network, with its size varying from 20 to 60 bytes. In this paper, l p denotes the complete length of the IP packet, encompassing headers, options, and application data as defined in Equation (2).
lp = I P b y t e s + T C P b y t e s + D a t a
Both l p and Δ t have been proven to be effective indicators of potential slow DoS activity [30,42], where the former uses the information gain feature ranking for selecting attributes based on their ranking scores.
This analysis was performed using the statistical analysis package SPSS. The normalised information gain measures the reduction in entropy of the target variable after observing each attribute and is determined using Equation (3).
IG norm ( Y , X ) = H ( Y ) H ( Y X ) H ( Y )
where H ( Y ) is the entropy of the target variable and H ( Y X ) is the conditional entropy of the target given the attribute X.
Focusing on eight of the most popularly ranked attributes in publicly accessible datasets, Figure 4, presents the information gain results for these attributes. In particular, the lp attribute scores highest ( 0.84 ) confirmed its prominence in differentiating node classes within this dataset. Furthermore, the Δ t value ( 0.55 ) implies its significance in this assessment. Information gain ranking provides demonstrable evidence to justify the inclusion of l p and Δ t in this study of resource-efficient slow DoS detection for IoT nodes. The rational to limited attribute selection was to use the fewest possible, and only those where a clear relationship to the attack profile is evident. In both [10,42], l p and Δ t are proven to produce values intrinsically aligned with the slow DoS attack profiles. This removes redundancy in attribute selection and significantly reduces the processing overhead on the detection node.
Figure 4. Attribute validation method.
For classification purposes, it is crucial that the source port and destination IP are considered static or unique attributes specific to individual node identity. Consequently, they are excluded from this study due to their strong association with the nodes themselves. However, as indicated in [51], different ML detection methods within IoT contexts incorporate these node-specific characteristics alongside other specified attributes.
Although attribute filtering is essential for streamlining ML models and reducing testing and training times, these should be considered with caution, as model over generalisation leading to overfitting can arise [5], which is significant in the context of resource-constraint IoT environments.

4.2. Stealthy Slow DoS and Slow Nodes

In order to design highly stealthy slow DoS attacks in the IoT network, each of the three slow DoS variants was manually configured to operate below the standard DoS attack parameters. This is an important inclusion given that publicly available datasets almost exclusively contain slow DoS traffic in their default attack configuration. This implies that highly stealthy slow DoS attacks, where the attack parameters are configured beyond the default, can evade detection, where the training is only on datasets with default attack parameters. To achieve this, the number of concurrent slow DoS connections (CNX) is reduced from 1000 to 500, which represents a notable decrease in attack volume and a substantial lowering of the network footprint and enhancing the stealthiness of the attack to evade detection mechanisms that rely on either high connection counts or traffic volume anomalies. To further mask slow DoS attacks, the attacking MN further adjusts the connection parameters, expressed in requests per connection (RPC). These parameters represent the time between requests which are pre-launch modified. However, in this analysis, these parameters are kept constant once a slow DoS attack has been initiated. The connection parameters set for the three profiles are detailed in Table 4.
Table 4. Configured connection parameter set for each traffic profile.
During simulations, the SN is subjected to deliberate random latencies ranging from 1500 to 3000 ms. Meanwhile, all other network nodes were left unchanged, functioning at their permitted capacity as dictated by the network infrastructure. The LPC setup that represents the reduced dataset is detailed in Table 5, indicating the instances of each node and the cumulative packet statistics used to evaluate resource overhead.
Table 5. Reduced dataset packet count per node.
To better contextualise the processing and resource saving from FPC, the packet statistics in Table 5 are compared with the complete bi-directional packet capture for each node in Table 6, where the general reduction in packets equates to a packet processing saving of ≈99.2% which comes from 620,678 to 4905 packets. In addition, if processing decreased from 396.1 MB to 0.52 MB, the overall reduction is ≈99.8%.
Table 6. Full dataset packet count per node.
For this evaluation, the SG, SR and SP network traffic has been aggregated into a unified MN class. The rationale being to emphasise the holistic accuracy of the model rather than isolating specific types of malicious behaviour. This is a common and prevalent practice, as demonstrated in [13,19,23].

5. Critical Results Evaluation

This section critically evaluates the slow DoS detection classification, accuracy, and precision first by using just LN and MN, before introducing SN. The accuracy is given in Equation (4), while precision, which measures how many of the positive predictions are true positives, is defined in Equation (5).
A c c u r a c y = T r u e P o s i t i v e s + T r u e N e g a t i v e s T o t a l N u m b e r o f C a s e s
P r e c i s i o n = T r u e P o s i t i v e T r u e P o s i t i v e + F a l s e P o s i t i v e
For this evaluation, five lightweight ML classifiers were considered, these being SVM (Support Vector Machine), K-Nearest Neighbour, Decision Tree, and Logistic Regression. Using the Weka framework as the test platform and using a stock test dataset, the decision tree classifier proved to be the most efficient in terms of speed and processing overhead. This choice of classifier, along with the justification, is documented in [12]. The default parameters of the J48 decision tree in Weka were used for model construction. These defaults include a confidence factor of 0.25 for pruning, a minimum of two instances per leaf. Given the dataset contained only numeric values for l p and Δ t , these settings were appropriate. Pruning ensures the tree does not overfit minor variations, while the minimum leaf size prevents overly specific splits. Since the dataset is discrete, the default parameters provided a balanced approach between model complexity and generalisation.
Given the default parameters, the decision tree classifier was trained and tested on the sample dataset built on the two attributes of l p and Δ t .
In Table 7, the test dataset has been reduced to include only LN and MN, facilitating a binary classification. This means the model is trained on only legitimate traffic patterns where the LN does not experience unusual fluctuations in delay due to high network latency. This narrowing allows examination of the performance of the decision tree classifier in a significantly reduced sample comprising only 4905 instances, where the attributes of l p and Δ t are scrutinised based on their recorded values, where l p is measured in bytes, and Δ t in seconds. The findings from the evaluation underscore the effectiveness of this simplistic decision tree model, revealing its ability to proficiently identify instances even when slow DoS attacks are meticulously designed to be covert. Achieving a high predicted accuracy of 96.2% and mean precision of 94.9% highlights that when LN and MN are present in the network, a lightweight decision tree classifier evaluating only two key attributes, with a reduced dataset leads to comparable results to ML approaches. For example, slow DoS detection is made possible here by testing the model on less than 5000 packets, equating to 526,633 bytes of data. This is in contrast to ML approaches that require large volumes of data, often gigabytes, to produce comparable detection accuracy. For example, [52] required the processing of 10 attributes, including 608,947 instances of legitimate and malicious traffic instances.
Table 7. Classified LN and MN.
However, like all other publicly available datasets, this approach fails to consider genuine SN with slow connectivity. Given that slow DoS attempts to evade detection by imitating nodes with poor connections, this needed to be factored into the modelling.
By including SN in the reduced dataset, it can be seen in Table 8 the LN accuracy decreases, along with the overall accuracy of the decision tree classifier. It is also apparent the decrease in accuracy is due to the increased misclassifications which collectively supports the hypothesis that incorporating SN within a network significantly impacts the detection performance of a model. This is intensified when persistent slow DoS activity is involved, raising questions about the reliability of classification outcomes that do not consider the impact of legitimate SN in their model. Furthermore, these observations buttress the premise that when SN is included in a dataset and is not accounted for, it can lead to inaccurate classification results. Given this approach analysed only 4905 packets, higher volumes of data packets processed could lead to even greater inaccuracies and misclassifications.
Table 8. Classified merged LN/SN and MN.
In summarising, evaluating the scenario in which SN traffic is not present, the MN class accuracy is 98.3% while the accuracy for the LN class is 91.5%. With SN present, the corresponding MN class accuracy is 97% while the accuracy for the LN/SN class is 94.3%. The notable difference in misclassification of LN and MN which increases from 47 to 88 instances is significant given the low volume of packets used.

5.1. Observations

Another important observation distilled from Table 8 is a comparison of the slow DoS detection model presented in [19], which achieved an accuracy of 92.6% for the decision tree classifier, along with a comparable average accuracy derived from six ML classifiers of 96.3%. In [37,53], the slow DoS proposals scored slightly higher in terms of overall accuracy, however, these approaches did not consider the resource imposition. For example, [53] required the extraction of 11 attributes, totalling 56,891 tuples, compared to the requirement of two attributes and 4905 packets for the solution presented here. In the work of [23], 18 bi-directional flow features were extracted, based on their observations and evaluation of the CIC-IDS 2017 and SUEE datasets. Their findings showed the decision tree outperformed other ML classifiers and, in doing so, recorded an overall detection accuracy of ≈99.99%.

Summary

While the model presented gives comparable detection accuracy to [19], and towards the top end of [23], the principal advantage is the significantly reduced resource overhead which is an essential design requirement in any IoT-based slow DoS detection model. Although the preceding evaluation demonstrates that a lightweight decision tree classifier operating on a reduced LPC dataset can achieve high classification accuracy with minimal attribute selection, it is important to reflect on the operational constraints imposed by resource-constrained IoT nodes. In IoT environments, the computational overhead associated with packet processing, feature extraction, and classification must be explicitly quantified and optimised. Detection accuracy alone does not capture the practical viability of a real-time model or embedded deployment scenarios, so it is vital to model the critical nexus between classification performance and processing cost to determine optimal operating thresholds. The next section presents a performance cost model that facilitates this balancing process with a systematic method to characterise the diminishing returns of increased packet analysis in constrained IoT networks.

6. Modelling Accuracy and Processing Cost

By focusing the slow DoS detection model only on attributes that are proven to be significant in terms of the attack type, i.e., l p and Δ t it has been shown to significantly lower the processing cost incurred by the detection node. In addition to the resource limitations of the IoT nodes, the aim must be to scale the detection model to an optimal point that balances the nexus of high detection accuracy and low detection processing cost.
Using metrics like accuracy, mean packet length, total packet volume, and the number of extracted features, a predictive model can be developed which scales the classifier’s performance with the number of packets processed. This judgement can be distilled from the decision tree classifier’s results in Table 8, where specifically, the model considers packets with a mean length of l p μ = 148 bytes. This allows for an estimate of how the accuracy improves as more packets are processed. Taking the decision tree classifier together with the LPC approach in Section 5, and applying this as a known variable, a conceptual model can be constructed that evaluates the processing cost relative to the increased detection accuracy.
Thus, it was possible to model the accuracy A ( p k ) of the detection system as an exponential function of the packet count p k , as shown in Equation (6). This model reflects the system behaviour where the accuracy rapidly improves with increasing packets before levelling off as it approaches the maximum.
A ( p k ) = A 0 + ( A m a x A 0 ) · 1 e k ( p k p k 0 )
  • A ( p k ) = Accuracy as a function of the packet count p k .
  • A 0 = 96.2 % = Initial accuracy at packet count p k 0
  • A m a x = 99.2 % = Final accuracy (maximum achievable)
  • p k 0 = 4905 = Initial packet count (where growth begins)
  • k = 0.0001 = Growth rate parameter for accuracy increase
This model can be used to represent the common saturation behaviour in resource-constrained detection systems, showing where early data yield significant gains, and further improvements become marginal with additional data being processed. Figure 5 shows the modelling of (a), the increase in accuracy from 96.2% based on the initial values of Table 7, and the total number of packets from the reduced dataset, to the optimum target values of 99.2% accuracy based on an approximation of similar ML approaches using the decision tree classifier [54,55].
Figure 5. Modelling accuracy, processing cost and performance gains.
The marginal accuracy gain is depicted in Figure 5b, which predicts the accuracy gained as additional packets are required for processing. This clearly confirms the model’s asymptotic behaviour between 10,000 and 20,000 packets, implying further packet processing is ineffective.
G ( p k ) = d A ( p k ) d p k = k ( A m a x A 0 ) e k ( p k p k 0 )
The benefit/cost ratio (R) in Figure 5c is defined as the ratio of accuracy improvement to processing overhead as defined in Equation (8). The corresponding (R) plot shows there is a local maximal point where further packet processing becomes superfluous.
R ( p k ) = A ( p k ) A 0 C ( p k )

6.1. Application Cost Modelling

The cost model in [10], calculates the processing overhead C a of an HTTP application, allowing a comparison of resource requirements between the proposed model, FPC and inbound-only packet capture. Equation (9) defines this cost model, based on a packet arrival rate β a (packets per second), the mean packet length l p μ (bytes), and ( t a ) being the total application runtime.
C a = β a · l p μ t a
A linear relationship between the packet processing rate and cost function is assumed to provide a simplified framework for comparative evaluation. The evaluation compares models using four metrics: application cost ( C a ), precision or accuracy (A), and processing time ( P t ). To ensure an equitable cross metric evaluation, Min-Max normalisation is applied to all values as in [51].
The normalised accuracy A norm is given by:
A norm = A A min A max A min
For those metrics where a lower value is preferable, i.e., C a , the inverse normalisation is used:
C norm = C max C C max C min
This step enhances interpretability and supports composite evaluation across various units of measurement.
To reflect the relative importance of each metric, a weight ω [ 0 , 1 ] is assigned which allows context sensitive emphasis depending on deployment needs. The composite score C Score is then calculated as a weighted sum of normalised values:
C Score = ω C · C norm + ω A · A norm + ω P t · P t norm
Higher C Score values indicate more efficient models while a lower C a indicates improved efficiency.
For consistency purposes, the values of C a and P t should reflect the prevailing operating environment, including network load, network interface card (NIC) capacity, and processing capabilities. These are all critical factors in a resource-constrained IoT network, so the min and max values should be derived from representative run time sampling.
Table 9 compares the LPC, FPC, and inbound-only models using the respective C Score and C a values of the relevant application.
Table 9. Comparison of models by normalised composite score.
While Equation (9) assumes linear scalability of the cost with the packet rate and size, this simplifies the analysis though real-world networks may be subject to stochastic effects due to congestion, CPU load, or network interface saturation.
To validate the linear assumption, benchmark tests were performed using two datasets (see Section 4) for packet rates ranging from 12.5 pps [48] to 34.2 pps [49]. A regression analysis of the observed costs yielded R 2 = 0.94, indicating a strong linear trend to validate the application of Equation (9) in this comparative evaluation.
Although the application cost model provides a direct means of comparing resource efficiency between detection models such as LPC, FPC, and inbound-only capture, it remains limited in scope by treating cost and accuracy as independent metrics. In realistic IoT deployments, these factors are intrinsically related and optimising one often comes at the expense of another. As such, a more holistic performance evaluation is required that allows the weighting of accuracy versus cost in line with specific deployment priorities, such as energy conservation, real-time responsiveness, or threat sensitivity. To address this, the next section introduces a generalised performance model (MPerf) that enables network security and system designers to calibrate detection strategies to meet the unique operational demands of resource-constrained IoT networks.

6.2. Modelling Performance

This approach to varying the number of packets and/or attributes for analysis can be further extended by adjusting the number of packets extracted (n). This provides a flexible model that can be applied to varying low resource operational requirements. In Equation (13), it is possible to find a preferable M P e r f by applying a weighted value ( ω ) to balance the accuracy required (A) with the overhead cost (C) of the model (see Equation (13)) which is a beneficial proposition for resource-constrained IoT nodes.
M P e r f ( n ) = ω A · A ( n ) ω c · C ( n )
M P e r f can be applied to approximate the relationship between A and C as illustrated in Figure 6, where C assumes a linear increase, with A and C being assigned weight values of 0.7 and 0.3 respectively.
Figure 6. MPerf approximation.
In Figure 6, the weights ω A = 0.7 and ω C = 0.3 have been chosen to reflect a scenario where detection accuracy is prioritised over computational cost. These values are not empirically derived, but are chosen to demonstrate the flexibility of the model. In practice, these weights can be fine tuned based on the specific constraints or objectives of the target IoT deployment like minimal power consumption or maximising detection accuracy.
By analysing both the accuracy and cost parameters in Figure 6, a compromise can be identified between slow DoS detection performance and resource consumption. In this scenario and based on the results in Table 7 and Table 8, a quasi-optimal performance point can be observed when the packet count n ≈ 2000, gradually decreasing to 3000 packets. Therefore, it can be hypothesised that a detection accuracy of around 98% is achievable with just 2000 packets. This modelling approach is particularly valuable for IoT networks where minimising detection overhead or maximising accuracy depending on operational priorities requires a flexible and scalable performance framework. The MPerf model has been derived from empirical data collected in the live IoT test network (Section 4), so it reflects the typical processing constraints and throughput limitations characteristic of IoT devices. While theoretical, the model is grounded in practical experimentation and offers a basis for future adaptation in intrusion detection methodologies. It can be calibrated to suit alternative hardware platforms, network conditions, or detection objectives, making it a versatile tool for IoT intrusion detection where balancing accuracy and resource expenditure is critical.

7. Conclusions

The growing pervasiveness of IoT deployments in critical domains requires intrusion detection mechanisms that are both accurate, and operationally viable within severe resource constraints. This paper introduces a lightweight and highly efficient slow DoS detection model designed specifically for environments where conventional, resource intensive methods are impractical. By evaluating the three slow DoS attack variants; slow GET, slow Read, and slow POST against legitimate and high latency genuine traffic, the model achieves a detection precision of more than 96% using just the two network attributes of TCP/IP packet length and the TCP delta time.
The core contribution is a novel packet capturing technique that significantly reduces processing overhead by more than 99%, along with the inclusion of genuine slow nodes to simulate real-world latency variations.
This supports a slow DoS detection strategy capable of discriminating benign SN communications from malicious stealthy attacks, a vital nuance overlooked in almost all existing detection schemes. This pragmatic minimal overhead model for slow DoS detection affords flexible IoT deployment options via a measurable and tunable nexus between detection performance and computational cost.
Future work will focus on extending the model’s applicability to time sensitive IoT applications, where minimal detection latency and false positives are paramount requirements. Incorporating adaptive thresholds, online learning, and real-time updates will be key to upholding high detection rates under an ever evolving malicious attack landscape. Moreover, embedding this detection framework into low power embedded systems and benchmarking its resilience against encrypted MN traffic in large scale IoT deployments will further authenticate its practical efficacy.

Author Contributions

Conceptualization, methodology, A.R.; formal analysis, A.R.; Writing—Review and Editing, A.R., L.S.D. and S.K.M.; Supervision, L.S.D. and S.K.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The dataset utilised in this study is available at https://ordo.open.ac.uk/articles/dataset/HTTP_DoS_Dataset_in_PCAP_format_for_Wireshark/17206289 (accessed on 15 February 2025).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
FPCFull Packet Capture
LPCLimited Packet Capture
SNslow Legitimate Node
SGslow GET
SRslow Read
SPslow POST
LNLegitimate Node
MNMalicious Node
TPTraffic Profile
l p TCP/IP Packet Length
Δ t Packet Delta Time

References

  1. Rizzardi, A.; Zachos, G.; Mantas, G.; Porfyrakis, K.; Rodriguez, J. Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks. Sensors 2025, 25, 1216. [Google Scholar] [CrossRef]
  2. Wakili, A.; Bakkali, S. Privacy-Preserving Security of IoT Networks: A Comparative Analysis of Methods and Applications. Cyber Secur. Appl. 2025, 25, 100084. [Google Scholar] [CrossRef]
  3. Cao, Z.; Zhao, Z.; Shang, W.; Ai, S.; Shen, S. Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices. Multimed. Tools Appl. 2024, 84, 16425–16453. [Google Scholar] [CrossRef]
  4. Sinha, S. Number of Connected IoT Devices Growing 13% to 18.8 Billion. 2024. Available online: https://iot-analytics.com/number-connected-iot-device (accessed on 2 January 2025).
  5. Saied, M.; Guirguis, S.; Madbouly, M. Review of filtering based feature selection for Botnet detection in the Internet of Things. Artif. Intell. Rev. 2025, 58, 114. [Google Scholar] [CrossRef]
  6. Reed, A.; Dooley, L.S.; Kouadri, S. A Reliable Real-Time slow DoS Detection Framework for Resource-Constrained IoT Networks. In Proceedings of the 2021 IEEE Global Communications Conference: IoT and Sensor Networks (Globecom2021 IoTSN), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar]
  7. Kampourakis, V.; Makrakis, G.M.; Kolias, C. From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks. Future Internet 2024, 16, 137. [Google Scholar] [CrossRef]
  8. Tripathi, N. Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis. IEEE Trans. Dependable Secur. Comput. 2024, 21, 1244–1256. [Google Scholar] [CrossRef]
  9. Mohammed, M.; Shailendra, S.; Jong, R.; Park, H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2020, 76, 5320–5363. [Google Scholar] [CrossRef]
  10. Reed, A.; Dooley, L.S.; Kouadri, S.M. The Guardian Node slow DoS Detection Model for Real-Time Application in IoT Networks. Sensors 2024, 24, 5581. [Google Scholar] [CrossRef]
  11. Coscia, A.; Dentamaro, V.; Galantucci, S.; Maci, A.; Pirlo, G. Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks. J. Inf. Secur. Appl. 2024, 82, 103736. [Google Scholar] [CrossRef]
  12. Logeswari, G.; Thangaramya, K.; Selvi, M.; Deepika Roselind, J. An improved synergistic dual-layer feature selection algorithm with two type classifier for efficient intrusion detection in IoT environment. Sci. Rep. 2025, 15, 8050. [Google Scholar] [CrossRef]
  13. Siriwardhana, Y.; Samarakoon, S.; Porambage, P.; Liyanage, M.; Chang, S.Y.; Kim, J.; Kim, J.; Ylianttila, M. Descriptor: 5G Wireless Network Intrusion Detection Dataset (5G-NIDD). IEEE Data Descr. 2025, 1–12. [Google Scholar] [CrossRef]
  14. Makina, H.; Letaifa, A.B.; Rachedi, A. Survey on security and privacy in Internet of Things -based eHealth applications: Challenges, architectures, and future directions. Secur. Priv. 2024, 7, e346. [Google Scholar] [CrossRef]
  15. Hasan, M.K.; Ghazal, T.M.; Saeed, R.A.; Pandey, B.; Gohel, H.; Eshmawi, A.A.; Abdel-Khalek, S.; Alkhassawneh, H.M. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. IET Commun. 2022, 16, 421–432. [Google Scholar] [CrossRef]
  16. Mendon, S. slow DOS Attack: Why It Is Dangerous and How to Detect Using a SIEM. 2016. Available online: https://www.paladion.net/blogs/how-to-detect-slow-dos-attack-using-siem (accessed on 4 January 2017).
  17. Dhanapal, A.; Nithyanandam, P. The slow http distributed denial of service attack detection in cloud. Scalable Comput. 2019, 20, 285–298. [Google Scholar] [CrossRef]
  18. NetScout. Slow Read Attacks. 2024. Available online: https://www.netscout.com/what-is-ddos/slow-post-attacks (accessed on 19 May 2024).
  19. Inchara, S.; Keerthana, D.; Babu, K.N.M.; Mabel, J.P. Detection and mitigation of slow DoS attacks using machine learning. In AIP Conference Proceedings; American Institute of Physics Inc.: College Park, MD, UDA, 2023; pp. 1–10. [Google Scholar] [CrossRef]
  20. Ilango, H.S.; Ma, M.; Su, R. A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT. Eng. Appl. Artif. Intell. 2022, 114, 105059. [Google Scholar] [CrossRef]
  21. Haddadi, M.; Khiat, A.; Bouaoud, H.; Djehiche, H. SPGDAD: Slow HTTP-Get denial of service attack detection using ontology. Inf. Secur. J. Glob. Perspect. 2024, 34, 79–87. [Google Scholar] [CrossRef]
  22. UNB. CIC-IDS2017. 2017. Available online: http://www.unb.ca/cic/datasets/ids-2017.html (accessed on 21 April 2022).
  23. Muraleedharan, N.; Janet, B. Scaffy: A slow denial-of-service attack classification model using flow data. Int. J. Inf. Secur. Priv. 2021, 15, 106–128. [Google Scholar] [CrossRef]
  24. Lukaseder, T. 2017-SUEE-Data-Set. 2017. Available online: https://github.com/vs-uulm/2017-SUEE-data-set/tree/master (accessed on 17 September 2025).
  25. Garcia, N.; Alcaniz, T.; González-Vidal, A.; Bernabe, J.B.; Rivera, D.; Skarmeta, A. Distributed real-time slowDoS attacks detection over encrypted traffic using Artificial Intelligence. J. Netw. Comput. Appl. 2021, 173, 1084–8045. [Google Scholar] [CrossRef]
  26. Jablaoui, R.; Cheikhrouhou, O.; Hamdi, M.; Liouane, N. Deep learning enabled intrusion detection system for IoT security. EURASIP J. Wirel. Commun. Netw. 2025, 2025, 66. [Google Scholar] [CrossRef]
  27. Gogoi, B.; Ahmed, T. HTTP Low and slow DoS Attack Detection using LSTM based deep learning. In Proceedings of the 2022 IEEE 19th India Council International Conference (INDICON), Kochi, India, 24–26 November 2022; pp. 1–6. [Google Scholar]
  28. Kemp, C.; Calvert, C.; Khoshgoftaar, T.M.; Leevy, J.L. An approach to application-layer DoS detection. J. Big Data 2023, 10, 22. [Google Scholar] [CrossRef]
  29. Chen, J.; Wu, H.; Wang, X.; Wang, S.; Cheng, G.; Hu, X. IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for slow HTTP DoS in high-speed networks. Comput. Secur. 2025, 150, 104291. [Google Scholar] [CrossRef]
  30. Chen, J.; Wu, H.; Wang, S.; Cheng, G.; Hu, X. An Accurate and Real-Time Detection Method for Concealed slow HTTP DoS in Backbone Network. In ICT Systems Security and Privacy Protection, Proceedings of the 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, 14–16 June 2023; Springer: Cham, Switzerland, 2024; Volume 679, pp. 207–221. [Google Scholar] [CrossRef]
  31. Kemp, C.; Calvert, C.; Khoshgoftaar, T.M. Detection Methods of slow Read DoS Using Full Packet Capture Data. In Proceedings of the 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020, Las Vegas, NV, USA, 11–13 August 2020; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2020; pp. 9–16. [Google Scholar] [CrossRef]
  32. Reed, A.; Dooley, L.S.; Mostefaoui, S.K. Packet Filtering and Sampling for Efficient slow Denial of Service Detection in Resource Scarce IoT Networks. In Proceedings of the 2023 International Symposium on Networks, Computers and Communications (ISNCC) 2023, Doha, Qatar, 23–26 October 2023; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2023; pp. 1–7. [Google Scholar] [CrossRef]
  33. Sikora, M.; Fujdiak, R.; Kuchar, K.; Holasova, E.; Misurec, J. Generator of slow Denial-of-Service Cyber Attacks. Sensors 2021, 21, 5473. [Google Scholar] [CrossRef]
  34. Prakash, K.J.; Saumya, B.; Tapaswi, S. mFCBF based lightweight intrusion detection system for IoT networks. Clust. Comput. 2025, 28, 416. [Google Scholar] [CrossRef]
  35. Memon, S.Q. Prevention Mechanism For RUDY Attack And Its Comparison. Univ. Sindh J. Inf. Commun. Technol. 2020, 4, 45–51. [Google Scholar]
  36. Fu, Y.; Duan, X.; Wang, K.; Li, B. Low-rate Denial of Service attack detection method based on time-frequency characteristics. J. Cloud Comput. 2022, 11, 1–19. [Google Scholar] [CrossRef]
  37. Sood, S.; Hubballi, N. slowTrack: Detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. J. Supercomput. 2024, 80, 1788–1817. [Google Scholar] [CrossRef]
  38. Dung, D.A.; Nakamura, Y. Verification of State Based slow HTTP DDoS Prevention Method. In Proceedings of the 12th IEEE International Conference on Control, Automation and Information Sciences, ICCAIS 2023, Hanoi, Vietnam, 27–29 November 2023; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2023; pp. 686–691. [Google Scholar] [CrossRef]
  39. Tang, D.; Wang, S.; Zhang, S.; Qin, Z.; Liang, W.; Xiao, S. Real-Time Monitoring and Mitigation of SDoS Attacks Using the SDN and New Metrics. IEEE Trans. Cogn. Commun. Netw. 2023, 9, 1721–1733. [Google Scholar] [CrossRef]
  40. Kapourchali, R.F.; Mohammadi, R.; Nassiri, M. P4httpGuard: Detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch. Clust. Comput. 2024, 27, 8047–8064. [Google Scholar] [CrossRef]
  41. Rios, V.; Inacio, P.; Magoni, D.; Freire, M. Detection of slowloris Attacks using Machine Learning Algorithms. In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, Avila Spain, 8–12 April 2024; pp. 1321–1330. [Google Scholar] [CrossRef]
  42. Reed, A.; Dooley, L.; Kouadri, S. SA-IDS: A single attribute intrusion detection system for slow DoS attacks in IoT networks. Internet Things 2025, 30, 101512. [Google Scholar] [CrossRef]
  43. Tripathi, N.; Hubballi, N.; Singh, Y. How Secure are Web Servers? An empirical study of slow HTTP DoS attacks and detection. In Proceedings of the =2016 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, 31 August 2016–2 September 2016; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2016; pp. 454–463. [Google Scholar] [CrossRef]
  44. Benzaid, C.; Boukhalfa, M.; Taleb, T. Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment. In Proceedings of the IEEE Wireless Communications and Networking Conference, WCNC, Seoul, Republic of Korea, 25–28 May 2020; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2020; Volume 2020-May, pp. 1–6. [Google Scholar] [CrossRef]
  45. Cambiaso, E. On the Use of Low Cost IoT Devices to Perpetrate slow DoS Attacks. In Proceedings of the Eighth International Congress on Information and Communication Technology; Lecture Notes in Networks and Systems; Springer Science and Business Media Deutschland GmbH: Singapore, 2024; Volume 695, pp. 859–875. [Google Scholar] [CrossRef]
  46. Herzalla, D.; Lunardi, W.T.; Andreoni, M. TII-SSRC-23 Dataset: Typological Exploration of Diverse Traffic Patterns for Intrusion Detection. IEEE Access 2023, 11, 118577–118594. [Google Scholar] [CrossRef]
  47. Karmous, N.; Aoueileyine, M.O.E.; Abdelkader, M.; Romdhani, L.; Youssef, N. Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices. Sensors 2024, 24, 5022. [Google Scholar] [CrossRef]
  48. Reed, A. HTTP DoS IoT Dataset. 2021. Available online: https://ordo.open.ac.uk/search?q=Reed (accessed on 20 June 2021).
  49. Neto, E.C.P.; Dadkhah, S.; Ferreira, R.; Zohourian, A.; Lu, R.; Ghorbani, A.A. CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 2023, 23, 5941. [Google Scholar] [CrossRef] [PubMed]
  50. Catillo, M.; Del Vecchio, A.; Pecchia, A.; Villano, U. A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection. In Quality of Information and Communications Technology, Proceedings of the 14th International Conference, QUATIC 2021, Algarve, Portugal, 8–11 September 2021; Springer: Cham, Switzerland, 2021; Volume 1439, pp. 253–266. [Google Scholar] [CrossRef]
  51. Shukla, P.; Krishna, C.R.; Patil, N.V. SDDA-IoT: Storm-based distributed detection approach for IoT network traffic-based DDoS attacks. Clust. Comput. 2024, 27, 6397–6424. [Google Scholar] [CrossRef]
  52. Swe, Y.M.; Aung, P.P.; Hlaing, A.S. A slow ddos attack detection mechanism using feature weighing and ranking. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Rome, Italy, 2–5 August 2021; pp. 4500–4509. [Google Scholar] [CrossRef]
  53. Abisoye, O.A.; Shadrach Akanji, O.; Abisoye, B.O.; Awotunde, J. slow Hypertext Transfer Protocol Mitigation Model in Software Defined Networks. In Proceedings of the 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy, ICDABI 2020, Sakheer, Bahrain, 26–27 October 2020; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar] [CrossRef]
  54. Fuladi, R.; Baykas, T.; Anarim, E. The Use of Statistical Features for Low-Rate Denial of Service Attack Detection. In Proceedings of the International Conference on 6G Networking, 6GNet 2023, Paris, France, 18–20 October 2023; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2023; pp. 1–7. [Google Scholar] [CrossRef]
  55. Alsolami, T.; Alsharif, B.; Ilyas, M. Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things. Sensors 2024, 24, 5937. [Google Scholar] [CrossRef] [PubMed]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.