Mohammed NasereddinMert NakipErol GelenbeNakıp, MertNasereddin, MohammedGelenbe, ErolE BulutF TschorschK Thilakarathna2025-10-062023979-8-3503-0074-1, 979-8-3503-0073-4979835030073497983503007410742-130310.1109/LCN58197.2023.102233582-s2.0-85164680462http://dx.doi.org/10.1109/LCN58197.2023.10223358https://gcris.yasar.edu.tr/handle/123456789/7393https://doi.org/10.1109/LCN58197.2023.10223358The IoT is vulnerable to network attacks and Intrusion Detection Systems (IDS) can provide high attack detection accuracy and are easily installed in IoT Servers. However IDS are seldom evaluated in operational conditions which are seriously impaired by attack overload. Thus a Local Area Network test-bed is used to evaluate the impact of UDP Flood Attacks on an IoT Server whose first line of defence is an accurate IDS. We show that attacks overload the multi-core Server and paralyze its IDS. Thus a mitigation scheme that detects attacks rapidly and drops packets within milli-seconds after the attack begins is proposed and experimentally evaluated.Englishinfo:eu-repo/semantics/openAccessInternet of Things, Local Area Networks, Cybersecurity, Random Neural Networks, G-Networks, UDP Flood Attacks, Intrusion Detection and MitigationMitigationRandom Neural NetworksInternet of ThingsG-networksUDP Flood AttacksIntrusion Detection and MitigationIntrusion DetectionLocal Area NetworksCybersecurityMeasurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-BedConference Object