Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks

被引:8
|
作者
Aswad, Firas Mohammed [1 ]
Ahmed, Ali Mohammed Saleh [2 ]
Alhammadi, Nafea Ali Majeed [3 ]
Khalaf, Bashar Ahmad [4 ]
Mostafa, Salama A. [5 ]
机构
[1] Univ Diyala, Coll Basic Educ, Comp Dept, Diyala 32001, Iraq
[2] Univ Diyala, Coll Educ Pure Sci, Diyala 32001, Iraq
[3] Shatt Al Arab Univ Coll, Dept Comp Sci, Basra 61002, Iraq
[4] Bilad Alrafidain Univ Coll, Dept Med Instruments Engn Tech, Diyala 32001, Iraq
[5] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Dept Software Engn, Batu Pahat 86400, Johor, Malaysia
关键词
distributed denial-of-service attacks; Internet of Things; deep learning; classification; CNN; BiLSTM; RNN; LSTM; INTRUSION DETECTION;
D O I
10.1515/jisys-2022-0155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth of informatics systems' technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. The performance of the models is quite effective as they obtain an accuracy rate of around 99.00%, except for the CNN model, which achieves an accuracy of 98.82%. The CNN-BiLSTM achieves the best accuracy of 99.76% and precision of 98.90%.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Sophistication in distributed denial-of-service attacks on the Internet
    Kumar, VA
    [J]. CURRENT SCIENCE, 2004, 87 (07): : 885 - 888
  • [2] Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things
    Borgiani, Vladimir
    Moratori, Patrick
    Kazienko, Juliano F.
    Tubino, Emilio R. R.
    Quincozes, Silvio E.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06): : 4569 - 4578
  • [3] Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms
    Mahdi, Zaed
    Abdalhussien, Nada
    Mahmood, Naba
    Zaki, Rana
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2139 - 2159
  • [4] Detection and Mitigation of Denial of Service Attacks in Internet of Things Networks
    Sanli, Mustafa
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (9) : 12629 - 12639
  • [5] Protecting the Internet from distributed denial-of-service attacks: A proposal
    Crocker, SD
    [J]. PROCEEDINGS OF THE IEEE, 2004, 92 (09) : 1375 - 1381
  • [6] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [7] Denial-of-service attacks rip the Internet
    Garber, L
    [J]. COMPUTER, 2000, 33 (04) : 12 - 17
  • [8] Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 374 - 390
  • [9] Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things
    Mergendahl, Samuel
    Li, Jun
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [10] An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks
    Roopak, Monika
    Parkinson, Simon
    Tian, Gui Yun
    Ran, Yachao
    Khan, Saad
    Chandrasekaran, Balasubramaniyan
    [J]. IET NETWORKS, 2024,