Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks

被引:0
作者
Li, Mingyue [1 ,2 ]
Zheng, Liudong [1 ,2 ]
Ma, Xiaoxue [3 ]
Li, Shuang [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071002, Peoples R China
[2] Hebei Univ, Hebei Prov Key Lab High Confidence Informat Syst, Baoding 071002, Peoples R China
[3] Hebei Univ, Dept Comp Teaching, Baoding 071002, Hebei, Peoples R China
关键词
Edge computing; DDoS attack; Distance threshold; Real-time monitoring; Independent model;
D O I
10.1016/j.jisa.2025.103972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge networks have an increasing demand for real-time attack detection as the duration of Distributed Denial- of-Service (DDoS) attacks decreases and causes missing of reporting insecure cases. However, the training and testing time of the existing detection model deployed on the edge server side is more expensive and cannot be well applied in practice. In this paper, we propose a real-time monitoring framework for DDoS attacks with edge server-device collaboration to solve these problems. Specifically, the edge server uses the k-means algorithm to represent the model boundaries and builds a separate group of recognition and monitoring models for each device by splitting the feature vectors. Furthermore, each device monitors the generated data in realtime through the model and submits suspicious data to the edge server for analysis. Finally, the server utilizes the k-neighbor algorithm which adds threshold selection and judgment to fine-grained identify updated benign data and specific categories of attack data. Experimental results show that the proposed scheme can effectively monitor benign data and attack data and identify attack types while the train time, test time and storage cost are less than that of the centralized model.
引用
收藏
页数:10
相关论文
共 31 条
  • [11] Real-Time Multistep Attack Prediction Based on Hidden Markov Models
    Holgado, Pilar
    Villagra, Victor
    Vazquez, Luis
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 134 - 147
  • [12] A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network
    Kumar, Randhir
    Kumar, Prabhat
    Tripathi, Rakesh
    Gupta, Govind P.
    Garg, Sahil
    Hassan, Mohammad Mehedi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 164 : 55 - 68
  • [13] Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment
    Li, Zhi
    Jin, Hai
    Zou, Deqing
    Yuan, Bin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (03) : 695 - 706
  • [14] Fast Failover and Switchover for Link Failures and Congestion in Software Defined Networks
    Lin, Ying-Dar
    Teng, Hung-Yi
    Hsu, Chia-Rong
    Liao, Chun-Chieh
    Lai, Yuan-Cheng
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [15] Low-rate DDoS attacks detection method using data compression and behavior divergence measurement
    Liu, Xinqian
    Ren, Jiadong
    He, Haitao
    Wang, Qian
    Song, Chen
    [J]. COMPUTERS & SECURITY, 2021, 100
  • [16] N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
    Meidan, Yair
    Bohadana, Michael
    Mathov, Yael
    Mirsky, Yisroel
    Shabtai, Asaf
    Breitenbacher, Dominik
    Elovici, Yuval
    [J]. IEEE PERVASIVE COMPUTING, 2018, 17 (03) : 12 - 22
  • [17] Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing
    Meng, Weizhi
    Wang, Yu
    Li, Wenjuan
    Liu, Zhe
    Li, Jin
    Probst, Christian W.
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 759 - 767
  • [18] A holistic review of Network Anomaly Detection Systems: A comprehensive survey
    Moustafa, Nour
    Hu, Jiankun
    Slay, Jill
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 128 : 33 - 55
  • [19] Putri NA, 2017, 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICECOS), P177, DOI 10.1109/ICECOS.2017.8167129
  • [20] SVELTE: Real-time intrusion detection in the Internet of Things
    Raza, Shahid
    Wallgren, Linus
    Voigt, Thiemo
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2661 - 2674