Matrix Profile Based Algorithms using Self-Collected Data for Detecting DDoS Attacks in IoT Equipment

被引:0
|
作者
Sinan, Fahri [1 ]
Fuladi, Ramin [1 ]
Anarim, Emin [1 ]
机构
[1] Bogazici Univ, Elect & Elect EngDept, Istanbul, Turkiye
关键词
Distributed Denial of Service (DDoS); Internet of Things (IoT); Matrix Profile (MP); Machine Learning (ML); Lightweight Algorithm; Self-Collected System Data;
D O I
10.1109/BLACKSEACOM61746.2024.10646189
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advent of emerging mobile network technologies such as 5G and Beyond 5G, the proliferation of Internet of Things (IoT) or, more broadly, Internet of Everything (IoE) integration has become ubiquitous across various industries and daily routines. Nevertheless, the pervasive vulnerabilities inherent in IoT networks-stemming from their widespread distribution, coupled with the limited security measures and processing capabilities of IoT devices-render them susceptible to a myriad of threats, notably Distributed Denial of Service (DDoS) attacks, which pose a grave risk to network availability. In response to the imperative for lightweight DDoS detection in IoT environments with resource constraints, this study is centered on Matrix Profile (MP)-based anomaly detection. Renowned for its effectiveness in analyzing time series data and distinguished by its expedited processing and minimal computational burden, this research undertakes a comparative analysis of six MP-based algorithms. Four unsupervised and two supervised algorithms are analyzed. These algorithms are specifically tailored to operate efficiently on IoT devices. The overarching objective is to assess the efficacy of these algorithms in identifying DDoS attacks through the utilization of system data derived from IoT devices. The study also endeavors to propose a novel approach aimed at fortifying the security posture of IoT networks against the pervasive threat of DDoS attacks.
引用
收藏
页码:135 / 139
页数:5
相关论文
共 50 条
  • [31] Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station
    Mondal, Koushik
    Yadav, Satyendra Singh
    Pal, Vipin
    Singh, Akhilendra Pratap
    Yogita, Yogita
    Singh, Mangal
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2022, 13 (06)
  • [32] A FHIR-BASED DATA FLOW ENABLING PATIENTS WITH DIABETES TO SHARE SELF-COLLECTED DATA WITH THE NORWEGIAN NATIONAL HEALTHCARE SYSTEMS AND ELECTRONIC HEALTH RECORD SYSTEMS
    Giordanengo, A.
    Bradway, M.
    Grottland, A.
    Hartvigsen, G.
    Arsand, E.
    [J]. DIABETES TECHNOLOGY & THERAPEUTICS, 2018, 20 : A109 - A109
  • [33] Detecting and classifying delay Data Exceptions on communication networks using rule based algorithms
    Benmusa, T
    Parish, DJ
    Sandford, M
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2005, 18 (02) : 159 - 177
  • [34] Wave analysis based on genetic algorithms using data collected from laboratories at different scales
    Nunez, Jonathan
    Cruchaga, Marcela
    Tampier, Gonzalo
    [J]. EUROPEAN JOURNAL OF MECHANICS B-FLUIDS, 2022, 95 : 231 - 239
  • [35] IMD-MP: Imputation of Missing Data in IoT Based on Matrix Profile and Spatio-temporal Correlations
    Lakshmi, G. V. Vidya
    Gopikrishnan, S.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (06) : 814 - 846
  • [36] Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives
    Ibrahim Bello
    Haruna Chiroma
    Usman A. Abdullahi
    Abdulsalam Ya’u Gital
    Fatsuma Jauro
    Abdullah Khan
    Julius O. Okesola
    Shafi’i M. Abdulhamid
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 8699 - 8717
  • [37] Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives
    Bello, Ibrahim
    Chiroma, Haruna
    Abdullahi, Usman A.
    Gital, Abdulsalam Ya'u
    Jauro, Fatsuma
    Khan, Abdullah
    Okesola, Julius O.
    Abdulhamid, Shafi'i M.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8699 - 8717
  • [38] NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints
    Ahmed, Chuadhry Mujeeb
    Mathur, Aditya P.
    Ochoa, Martin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (01)
  • [39] Detecting False Data Injection Attacks Using Machine Learning-Based Approaches for Smart Grid Networks
    Abudin, M. D. Jainul
    Thokchom, Surmila
    Naayagi, R. T.
    Panda, Gayadhar
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (11):
  • [40] Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
    Das, Mohammad Ashrafuzzaman
    Das, Saikat
    Chakhchoukh, Yacine
    Shiva, Sajjan
    Sheldon, Frederick T.
    [J]. COMPUTERS & SECURITY, 2020, 97