DAG: A Lightweight and Real-Time Edge Defense Model for IoT DDoS Attacks

被引:0
作者
Liu, Yanhua [1 ,2 ]
Chen, Cong [1 ,2 ]
Zhang, Qiu [1 ,2 ]
Zeng, Fanhao [1 ,2 ]
Liu, Ximeng [1 ,2 ]
机构
[1] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350116, Peoples R China
[2] Fuzhou Univ, Fujian Prov Key Lab Networking Comp & Intelligent, Fuzhou 350116, Peoples R China
来源
FRONTIERS OF NETWORKING TECHNOLOGIES, CCF CHINANET 2023 | 2024年 / 1988卷
基金
中国国家自然科学基金;
关键词
IoT security; DDoS Attacks; Edge Defense; Deep Learning; Reconstruction Structure;
D O I
10.1007/978-981-97-3890-8_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things (IoT) devices are increasingly used in people's lives and production in various industries. To detect and defend against Denial-of-Service (DDoS) attacks that occur on IoT networks, a lot of methods based on machine learning and deep learning have been proposed in recent years. However, these methods usually do not consider the limitation of computational resources of IoT devices. In this paper, we propose an edge model DDoS-Attack-Guard (DAG) based on Bi-GRU and ShuffleNet for DDoS identification and classification with the target of lightweight and real-time. To demonstrate the performance of our models, we use the CICDDoS2019 dataset to test the identification and classification accuracy as well as the model inference time. In addition, we build a multi-layer coder-decoder structure that can extract the potential temporal contextual features of DDoS traffic, and introduce a reconstruction structure that can improve model training. Through ablation experiments and comparative experiments, our model has an average inference speed of 2.5ms across different data sizes, which is 50% faster than the Sota method, while hitting 99.3% and 99.9% accuracy in identification and classification respectively.
引用
收藏
页码:61 / 73
页数:13
相关论文
共 19 条
[1]   A comprehensive deep learning benchmark for IoT IDS [J].
Ahmad, Rasheed ;
Alsmadi, Izzat ;
Alhamdani, Wasim ;
Tawalbeh, Lo'ai .
COMPUTERS & SECURITY, 2022, 114
[2]   Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov Model [J].
Alshammari, Ahmad ;
Zohdy, Mohamed A. .
2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, :550-554
[3]   Deep learning and big data technologies for IoT security [J].
Amanullah, Mohamed Ahzam ;
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza Hanum ;
Gani, Abdullah ;
Ahmed, Ejaz ;
Nainar, Abdul Salam Mohamed ;
Akim, Nazihah Md ;
Imran, Muhammad .
COMPUTER COMMUNICATIONS, 2020, 151 :495-517
[4]  
Baranyi P., 2019, New trends in the world of iot threats
[5]   Machine Learning in Real-Time Internet of Things (IoT) Systems: A Survey [J].
Bian, Jiang ;
Al Arafat, Abdullah ;
Xiong, Haoyi ;
Li, Jing ;
Li, Li ;
Chen, Hongyang ;
Wang, Jun ;
Dou, Dejing ;
Guo, Zhishan .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8364-8386
[6]  
Cho KYHY, 2014, Arxiv, DOI arXiv:1406.1078
[7]   A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems [J].
Elnour, Mariam ;
Meskin, Nader ;
Khan, Khaled ;
Jain, Raj .
IEEE ACCESS, 2020, 8 :36639-36651
[8]   An Algorithm for Detection of Traffic Attribute Exceptions Based on Cluster Algorithm in Industrial Internet of Things [J].
Fu, Lidong ;
Zhang, Wenbo ;
Tan, Xiaobo ;
Zhu, Hongbo .
IEEE ACCESS, 2021, 9 :53370-53378
[9]   Real-time big data processing for anomaly detection: A Survey [J].
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza ;
Gani, Abdullah ;
Hashem, Ibrahim Abaker Targio ;
Ahmed, Ejaz ;
Imran, Muhammad .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 45 :289-307
[10]   Deep Learning [J].
Hao, Xing ;
Zhang, Guigang ;
Ma, Shang .
INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2016, 10 (03) :417-439