Flow and unified information-based DDoS attack detection system for multi-topology IoT networks

被引:1
|
作者
Saiyed, Makhduma F. [1 ]
Al-Anbagi, Irfan [1 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Greedy bin packing distance; Conditional entropy; DDoS attack; Event-driven architecture; High-volume attack; Information entropy; IoT security; KL divergence; Low-volume attack; Statistical analysis; ENTROPY;
D O I
10.1016/j.iot.2023.100976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks are vulnerable to Distributed Denial of Service (DDoS) attacks, which can degrade their Quality of Service (QoS). In general, DDoS attacks are classified into high-and low-volume attacks. Existing statistical-based methods for DDoS attack detection in IoT networks are effective only for high-volume or low-volume attacks, but not for both. The majority of research in this domain relies on single-dimensional analysis and static thresholds. In response to these limitations, this paper introduces a Flow and Unified Information-based DDoS (FLUID) attack detection system, a lightweight statistical approach, for DDoS attack detection in IoT networks. The FLUID system incorporates multi-dimensional analysis by integrating unified information and flow behavior to effectively identify both high-and low -volume DDoS attacks. FLUID utilizes entropy and distance metrics, such as Kullback-Leibler (KL) divergence and greedy bin-packing, as unified information measures to distinguish legitimate traffic from malicious activity. Additionally, it examines flow behavior to gain insights into network traffic patterns. Notably, the FLUID system maintains its lightweight nature through a streamlined set of network features and optimized computational efficiency. Evaluations on real-world IoT client/server and Event-Driven Architecture (EDA) testbeds with the ToN-IoT, CICIDS 2017, CICIDS 2019, and DoS/DDoS-MQTT-IoT datasets show that the FLUID system can achieve over 90% detection accuracy for both high-and low-volume DDoS attacks.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks
    Dong, Shi
    Sarem, Mudar
    [J]. IEEE ACCESS, 2020, 8 : 5039 - 5048
  • [32] Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks
    Bhayo, Jalal
    Shah, Syed Attique
    Hameed, Sufian
    Ahmed, Awais
    Nasir, Jamal
    Draheim, Dirk
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
  • [33] DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
    Tao, Yuan
    Yu, Shui
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 233 - 240
  • [34] Design of an IoT DDoS attack prediction system based on data mining technology
    Lingfeng Huang
    [J]. The Journal of Supercomputing, 2022, 78 : 4601 - 4623
  • [35] Design of an IoT DDoS attack prediction system based on data mining technology
    Huang, Lingfeng
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (04): : 4601 - 4623
  • [36] Research on Real-Time Flow Abnormal Traffic Detection System Based on DDoS Attack
    Yue, Xin
    Mo, Xiuliang
    Wang, Chundong
    Yao, Xin
    [J]. RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 206 - 212
  • [37] DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
    Zhang, Long
    Wang, Jinsong
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (05): : 909 - 918
  • [38] Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system
    Kesavamoorthy, R.
    Soundar, K. Ruba
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9469 - S9476
  • [39] A New Multi Classifier System using Entropy-based Features in DDoS Attack Detection
    Koay, Abigail
    Chen, Aaron
    Welch, Ian
    Seah, Winston K. G.
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 162 - 167
  • [40] Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system
    R. Kesavamoorthy
    K. Ruba Soundar
    [J]. Cluster Computing, 2019, 22 : 9469 - 9476