Flow and unified information-based DDoS attack detection system for multi-topology IoT networks

被引:1
|
作者
Saiyed, Makhduma F. [1 ]
Al-Anbagi, Irfan [1 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Greedy bin packing distance; Conditional entropy; DDoS attack; Event-driven architecture; High-volume attack; Information entropy; IoT security; KL divergence; Low-volume attack; Statistical analysis; ENTROPY;
D O I
10.1016/j.iot.2023.100976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks are vulnerable to Distributed Denial of Service (DDoS) attacks, which can degrade their Quality of Service (QoS). In general, DDoS attacks are classified into high-and low-volume attacks. Existing statistical-based methods for DDoS attack detection in IoT networks are effective only for high-volume or low-volume attacks, but not for both. The majority of research in this domain relies on single-dimensional analysis and static thresholds. In response to these limitations, this paper introduces a Flow and Unified Information-based DDoS (FLUID) attack detection system, a lightweight statistical approach, for DDoS attack detection in IoT networks. The FLUID system incorporates multi-dimensional analysis by integrating unified information and flow behavior to effectively identify both high-and low -volume DDoS attacks. FLUID utilizes entropy and distance metrics, such as Kullback-Leibler (KL) divergence and greedy bin-packing, as unified information measures to distinguish legitimate traffic from malicious activity. Additionally, it examines flow behavior to gain insights into network traffic patterns. Notably, the FLUID system maintains its lightweight nature through a streamlined set of network features and optimized computational efficiency. Evaluations on real-world IoT client/server and Event-Driven Architecture (EDA) testbeds with the ToN-IoT, CICIDS 2017, CICIDS 2019, and DoS/DDoS-MQTT-IoT datasets show that the FLUID system can achieve over 90% detection accuracy for both high-and low-volume DDoS attacks.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Entropy and Divergence-based DDoS Attack Detection System in IoT Networks
    Saiyed, Makhduma
    Al Anbagi, Irfan
    [J]. 2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 224 - 230
  • [2] Multi-objective-based feature selection for DDoS attack detection in IoT networks
    Roopak, Monika
    Tian, Gui Yun
    Chambers, Jonathon
    [J]. IET NETWORKS, 2020, 9 (03) : 120 - 127
  • [3] DDoS attack detection techniques in IoT networks: a survey
    Pakmehr, Amir
    Assmuth, Andreas
    Taheri, Negar
    Ghaffari, Ali
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14637 - 14668
  • [4] Multi-Topology Routing Algorithms in SDN-Based Space Information Networks
    Meng, Xiangli
    Wu, Lingda
    Yu, Shaobo
    [J]. FUTURE INTERNET, 2019, 11 (01)
  • [5] A Genetic Algorithm- and t-Test-Based System for DDoS Attack Detection in IoT Networks
    Saiyed, Makhduma F.
    Al-Anbagi, Irfan
    [J]. IEEE ACCESS, 2024, 12 : 25623 - 25641
  • [6] DDoS attack detection in IoT systems using Neural Networks
    Hekmati, Arvin
    [J]. PROCEEDINGS OF THE 2023 THE 22ND INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, IPSN 2023, 2023, : 340 - 341
  • [7] Detection and Prevention Algorithm of DDoS Attack Over the IOT Networks
    Nsaif, Mohammed Ridha
    Abbood, Mohammed Falah
    Mahdi, Abbas Fadhil
    [J]. TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2020, 9 (03): : 899 - 906
  • [8] Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
    Alhasawi, Yaser
    Alghamdi, Salem
    [J]. IEEE ACCESS, 2024, 12 : 42357 - 42368
  • [9] Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks
    Saiyedand, Makhduma F.
    Al-Anbagi, Irfan
    [J]. IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 596 - 616
  • [10] Research on DDoS Attack Detection Based on ELM in IoT Environment
    Li, Zhihui
    Wei, Lihong
    Li, Wei
    Wei, Lai
    Chen, Minshi
    Lv, Ming
    Zhi, Xulong
    Wang, Chenguang
    Gao, Nan
    [J]. PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 144 - 148