Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT

被引:5
|
作者
Arnaboldi, Luca [1 ]
Morisset, Charles [1 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne, Tyne & Wear, England
关键词
NEURAL NETWORKS; SECURITY; INTERNET;
D O I
10.1007/978-3-030-04771-9_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Denial of service attacks are especially pertinent to the internet of things as devices have less computing power, memory and security mechanisms to defend against them. The task of mitigating these attacks must therefore be redirected from the device onto a network monitor. Network intrusion detection systems can be used as an effective and efficient technique in internet of things systems to offload computation from the devices and detect denial of service attacks before they can cause harm. However the solution of implementing a network intrusion detection system for internet of things networks is not without challenges due to the variability of these systems and specifically the difficulty in collecting data. We propose a model-hybrid approach to model the scale of the internet of things system and effectively train network intrusion detection systems. Through bespoke datasets generated by the model, the IDS is able to predict a wide spectrum of real-world attacks, and as demonstrated by an experiment construct more predictive datasets at a fraction of the time of other more standard techniques.
引用
收藏
页码:130 / 145
页数:16
相关论文
共 50 条
  • [41] #PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones
    Birnbach, Simon
    Baker, Richard
    Eberz, Simon
    Martinovic, Ivan
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (04)
  • [42] Detection of DoS attacks using machine learning techniques
    Kumar, Deepak
    Kukreja, Vinay
    Kadyan, Virender
    Mittal, Mohit
    [J]. International Journal of Vehicle Autonomous Systems, 2020, 15 (3-4): : 256 - 270
  • [43] A Similarity Based Approach for Application DoS Attacks Detection
    Aiello, Maurizio
    Cambiaso, Enrico
    Scaglione, Silvia
    Papaleo, Gianluca
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [44] Change-point monitoring for the detection of DoS attacks
    Wang, HN
    Zhang, DL
    Shin, KG
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (04) : 193 - 208
  • [45] Detection and Mitigation of DoS Attacks in Software Defined Networks
    Gao, Shang
    Peng, Zhe
    Xiao, Bin
    Hu, Aiqun
    Song, Yubo
    Ren, Kui
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (03) : 1419 - 1433
  • [46] Evaluation of detection method to mitigate DoS attacks in MANETs
    Alsumayt, Albandari
    Haggerty, John
    Lotfi, Ahmad
    [J]. 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [47] Optimal DoS Attacks on Bayesian Quickest Change Detection
    Ren, Xiaoqiang
    Mo, Yilin
    Shi, Ling
    [J]. 2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 3765 - 3770
  • [48] DoS Attacks Intelligent Detection using Neural Networks
    Alfantookh, Abdulkader A.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2006, 18 : 27 - +
  • [49] Detection of DoS/DDoS attacks: the UBM and GMM approach
    Martinez Osorio, Jorge Steven
    Vergara Tejada, Jaime Alberto
    Botero Vega, Juan Felipe
    [J]. 2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 866 - 871
  • [50] Detection of Stealthy TCP-based DoS Attacks
    Aqil, Azeem
    Atya, Ahmed O. F.
    Jaeger, Trent
    Krishnamurthy, Srikanth V.
    Levitt, Karl
    McDaniel, Patrick D.
    Rowe, Jeff
    Swami, Ananthram
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 348 - 353