UDP Flood Attack Detection in IoT Networks Using Decision Tree Algorithm

Nurul Afifah,D. Stiawan,Septiani Kusuma Ningrum,Riki Andika,Elisa Dwi Nanda,A. Nugroho

Published 2025 in 2025 12th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)

ABSTRACT

UDP Flood Denial of Service (DoS) attacks are a critical threat to network security, especially in IoT systems with limited resources. These attacks exploit the UDP (User Datagram Protocol), which does not require a handshake, by flooding the target with high-speed fake packets. As a result, the network experiences bandwidth and resource overload, causing high latency or service crashes. In IoT environments, the impact is more severe because devices typically have low processing capacity and memory. This study focuses on early detection of UDP Flood attacks through network feature analysis and Decision Tree-based classification to mitigate such risks. Testing results show that the model can identify 10 attack samples and 13 normal samples out of 23 test data with 99.98% F1 score. This high accuracy is supported by the dominance of attack packets (99,734) over normal packets (251) in the dataset. The study demonstrates that the combination of UDP port features, packet length, and IP header effectively detects UDP Flood patterns.

PUBLICATION RECORD

  • Publication year

    2025

  • Venue

    2025 12th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)

  • Publication date

    2025-09-25

  • Fields of study

    Not labeled

  • Identifiers
  • External record

    Open on Semantic Scholar

  • Source metadata

    Semantic Scholar

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-21 of 21 references · Page 1 of 1

CITED BY

  • No citing papers are available for this paper.

Showing 0-0 of 0 citing papers · Page 1 of 1