Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks

被引:7
|
作者
Aswad, Firas Mohammed [1 ]
Ahmed, Ali Mohammed Saleh [2 ]
Alhammadi, Nafea Ali Majeed [3 ]
Khalaf, Bashar Ahmad [4 ]
Mostafa, Salama A. [5 ]
机构
[1] Univ Diyala, Coll Basic Educ, Comp Dept, Diyala 32001, Iraq
[2] Univ Diyala, Coll Educ Pure Sci, Diyala 32001, Iraq
[3] Shatt Al Arab Univ Coll, Dept Comp Sci, Basra 61002, Iraq
[4] Bilad Alrafidain Univ Coll, Dept Med Instruments Engn Tech, Diyala 32001, Iraq
[5] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Dept Software Engn, Batu Pahat 86400, Johor, Malaysia
关键词
distributed denial-of-service attacks; Internet of Things; deep learning; classification; CNN; BiLSTM; RNN; LSTM; INTRUSION DETECTION;
D O I
10.1515/jisys-2022-0155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth of informatics systems' technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. The performance of the models is quite effective as they obtain an accuracy rate of around 99.00%, except for the CNN model, which achieves an accuracy of 98.82%. The CNN-BiLSTM achieves the best accuracy of 99.76% and precision of 98.90%.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed ) Denial of Service Attacks
    Malliga, S.
    Nandhini, P. S.
    Kogilavani, S. V.
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2022, 51 (01): : 180 - 215
  • [32] Denial-of-service attacks
    Neumann, PG
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [33] Denial-of-Service Attacks in OpenFlow SDN Networks
    Kandoi, Rajat
    Antikainen, Markku
    [J]. PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1322 - 1326
  • [34] FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things
    Mergendahl, Samuel
    Sisodia, Devkishen
    Li, Jun
    Cam, Hasan
    [J]. 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [35] Proactive model for mitigating internet denial-of-service attacks
    Nagesh, H. R. K.
    Sekaran, Chandra
    Kordcal, Adarsh Rao
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 96 - +
  • [36] Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited
    Almon, Lars
    Riecker, Michael
    Hollick, Matthias
    [J]. 2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 444 - 452
  • [37] Effectiveness and Detection of Denial-of-Service Attacks in Tor
    Danner, Norman
    Defabbia-Kane, Sam
    Krizanc, Danny
    Liberatore, Marc
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (03)
  • [38] Detection of Denial-of-Service Attacks with SNMP/RMON
    Boyar, O.
    Ozen, M. E.
    Metin, B.
    [J]. 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON INTELLIGENT ENGINEERING SYSTEMS (INES 2018), 2018, : 437 - 440
  • [39] Harnessing the power of BitTorrent for distributed denial-of-service attacks
    Wu, Lei
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 860 - 870
  • [40] An analysis of using reflectors for distributed denial-of-service attacks
    Paxson, V
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (03) : 38 - 47