Matrix Profile Based Algorithms using Self-Collected Data for Detecting DDoS Attacks in IoT Equipment

被引:0
|
作者
Sinan, Fahri [1 ]
Fuladi, Ramin [1 ]
Anarim, Emin [1 ]
机构
[1] Bogazici Univ, Elect & Elect EngDept, Istanbul, Turkiye
关键词
Distributed Denial of Service (DDoS); Internet of Things (IoT); Matrix Profile (MP); Machine Learning (ML); Lightweight Algorithm; Self-Collected System Data;
D O I
10.1109/BLACKSEACOM61746.2024.10646189
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advent of emerging mobile network technologies such as 5G and Beyond 5G, the proliferation of Internet of Things (IoT) or, more broadly, Internet of Everything (IoE) integration has become ubiquitous across various industries and daily routines. Nevertheless, the pervasive vulnerabilities inherent in IoT networks-stemming from their widespread distribution, coupled with the limited security measures and processing capabilities of IoT devices-render them susceptible to a myriad of threats, notably Distributed Denial of Service (DDoS) attacks, which pose a grave risk to network availability. In response to the imperative for lightweight DDoS detection in IoT environments with resource constraints, this study is centered on Matrix Profile (MP)-based anomaly detection. Renowned for its effectiveness in analyzing time series data and distinguished by its expedited processing and minimal computational burden, this research undertakes a comparative analysis of six MP-based algorithms. Four unsupervised and two supervised algorithms are analyzed. These algorithms are specifically tailored to operate efficiently on IoT devices. The overarching objective is to assess the efficacy of these algorithms in identifying DDoS attacks through the utilization of system data derived from IoT devices. The study also endeavors to propose a novel approach aimed at fortifying the security posture of IoT networks against the pervasive threat of DDoS attacks.
引用
收藏
页码:135 / 139
页数:5
相关论文
共 50 条
  • [21] A Distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing
    Kumar, Prabhat
    Kumar, Randhir
    Gupta, Govind P.
    Tripathi, Rakesh
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
  • [22] Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks
    Babu, Erukala Suresh
    SrinivasaRao, B. K. M.
    Nayak, Soumya Ranjan
    Verma, Amit
    Alqahtani, Fayez
    Tolba, Amr
    Mukherjee, Amrit
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [23] Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm
    Wang, Song
    Gomez, Karina
    Sithamparanathan, Kandeepan
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    Zanna, Paul
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [24] Safeguarding IoT networks against DDoS attacks using deep learning based zero trust network access
    Khan, Murad
    [J]. Electronics Letters, 2024, 60 (21)
  • [25] Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms
    Mahdi, Zaed
    Abdalhussien, Nada
    Mahmood, Naba
    Zaki, Rana
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2139 - 2159
  • [26] ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices
    Gonzalez-Landero, Franks
    Garcia-Magarino, Ivan
    Lacuesta, Raquel
    Lloret, Jaime
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [27] Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet Based Environments
    Sree, T. Raja
    Bhanu, S. Mary Saira
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 259 - 269
  • [28] Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
    Zeeshan, Muhammad
    Riaz, Qaiser
    Bilal, Muhammad Ahmad
    Shahzad, Muhammad K.
    Jabeen, Hajira
    Haider, Syed Ali
    Rahim, Azizur
    [J]. IEEE ACCESS, 2022, 10 : 2269 - 2283
  • [29] Signature-Based Traffic Classification and Mitigation for DDoS Attacks Using Programmable Network Data Planes
    Dimolianis, Marinos
    Pavlidis, Adam
    Maglaris, Vasilis
    [J]. IEEE ACCESS, 2021, 9 : 113061 - 113076
  • [30] Detection of Distributed Denial of Service (DDoS) Attacks in IOT Based Monitoring System of Banking Sector Using Machine Learning Models
    Islam, Umar
    Muhammad, Ali
    Mansoor, Rafiq
    Hossain, Md Shamim
    Ahmad, Ijaz
    Eldin, Elsayed Tag
    Khan, Javed Ali
    Rehman, Ateeq Ur
    Shafiq, Muhammad
    [J]. SUSTAINABILITY, 2022, 14 (14)