UDP Flood Denial of Service (DoS) attacks are a critical threat to network security, especially in IoT systems with limited resources. These attacks exploit the UDP (User Datagram Protocol), which does not require a handshake, by flooding the target with high-speed fake packets. As a result, the network experiences bandwidth and resource overload, causing high latency or service crashes. In IoT environments, the impact is more severe because devices typically have low processing capacity and memory. This study focuses on early detection of UDP Flood attacks through network feature analysis and Decision Tree-based classification to mitigate such risks. Testing results show that the model can identify 10 attack samples and 13 normal samples out of 23 test data with 99.98% F1 score. This high accuracy is supported by the dominance of attack packets (99,734) over normal packets (251) in the dataset. The study demonstrates that the combination of UDP port features, packet length, and IP header effectively detects UDP Flood patterns.
UDP Flood Attack Detection in IoT Networks Using Decision Tree Algorithm
Nurul Afifah,D. Stiawan,Septiani Kusuma Ningrum,Riki Andika,Elisa Dwi Nanda,A. Nugroho
Published 2025 in 2025 12th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
ABSTRACT
PUBLICATION RECORD
- Publication year
2025
- Venue
2025 12th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
- Publication date
2025-09-25
- Fields of study
Not labeled
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-21 of 21 references · Page 1 of 1
CITED BY
- No citing papers are available for this paper.
Showing 0-0 of 0 citing papers · Page 1 of 1