Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks

被引:7
|
作者
Aswad, Firas Mohammed [1 ]
Ahmed, Ali Mohammed Saleh [2 ]
Alhammadi, Nafea Ali Majeed [3 ]
Khalaf, Bashar Ahmad [4 ]
Mostafa, Salama A. [5 ]
机构
[1] Univ Diyala, Coll Basic Educ, Comp Dept, Diyala 32001, Iraq
[2] Univ Diyala, Coll Educ Pure Sci, Diyala 32001, Iraq
[3] Shatt Al Arab Univ Coll, Dept Comp Sci, Basra 61002, Iraq
[4] Bilad Alrafidain Univ Coll, Dept Med Instruments Engn Tech, Diyala 32001, Iraq
[5] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Dept Software Engn, Batu Pahat 86400, Johor, Malaysia
关键词
distributed denial-of-service attacks; Internet of Things; deep learning; classification; CNN; BiLSTM; RNN; LSTM; INTRUSION DETECTION;
D O I
10.1515/jisys-2022-0155
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid growth of informatics systems' technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. The performance of the models is quite effective as they obtain an accuracy rate of around 99.00%, except for the CNN model, which achieves an accuracy of 98.82%. The CNN-BiLSTM achieves the best accuracy of 99.76% and precision of 98.90%.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [42] Adaptive Response System for Distributed Denial-of-Service Attacks
    Thing, Vrizlynn L. L.
    Sloman, Morris
    Dulay, Naranker
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 809 - 814
  • [43] Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things
    Alimi, Kuburat Oyeranti Adefemi
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    Alimi, Oyeniyi Akeem
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [44] Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
    Gavrilis, D
    Dermatas, E
    [J]. COMPUTER NETWORKS, 2005, 48 (02) : 235 - 245
  • [45] Analysis Distributed Denial-of-Service Attack Deploy Deep Learning Techniques
    Qureshi, Sirajuddin
    He, Jingsha
    Tunio, Saima
    Zhu, Nafei
    Ullah, Faheem
    Nazir, Ahsan
    Wajahat, Ahsan
    [J]. International Journal of Network Security, 2023, 25 (05) : 745 - 757
  • [46] Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method
    Usuzaki, Shotaro
    Arikawa, Yuki
    Yamaba, Hisaaki
    Aburada, Kentaro
    Kubota, Shin-Ichiro
    Park, Mirang
    Okazaki, Naonobu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 914 - 923
  • [47] Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
    Spathoulas, Georgios
    Giachoudis, Nikolaos
    Damiris, Georgios-Paraskevas
    Theodoridis, Georgios
    [J]. FUTURE INTERNET, 2019, 11 (11):
  • [48] Slow denial-of-service attacks on software defined networks
    Interdisciplinary Centre for Security, Reliability and Trust , University of Luxembourg, Luxembourg
    不详
    不详
    [J]. Comput. Networks, 2020,
  • [49] Denial-of-service in wireless sencsor networks: Attacks and defenses
    Raymond, David R.
    Midkiff, Scott F.
    [J]. IEEE PERVASIVE COMPUTING, 2008, 7 (01) : 74 - 81
  • [50] Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks
    Tan, Yi
    Sengupta, Shamik
    Subbalakshmi, K. P.
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,