Securing IoT Based Maritime Transportation System Through Entropy-Based Dual-Stack Machine Learning Framework

被引:10
作者
Ali, Farhan [1 ]
Sarwar, Sohail [2 ]
Shafi, Qaisar M. [3 ]
Iqbal, Muddesar [4 ]
Safyan, Muhammad [5 ]
Qayyum, Zia Ul [6 ]
机构
[1] Univ Engn & Technol UET, CASE, Taxila, Pakistan
[2] Prince Sultan Univ, Coll Engn, Commun & Networks Engn Dept, Renewable Energy Lab, Riyadh, Saudi Arabia
[3] Natl Univ Comp & Emerging Sci, Fdn Advancement Sci & Technol NUCES FAST, Dept Comp, Islamabad 44100, Pakistan
[4] London South Bank Univ, Sch Engn & Informatics, Div Comp Sci & Informat, London SE1 0AA, England
[5] Govt Coll Univ Lahore, Dept Comp Sci, Lahore, Pakistan
[6] Allama Iqbal Open Univ, Dept Comp Sci, Islamabad 44310, Pakistan
关键词
Internet of Things; Entropy; Denial-of-service attack; Security; Computer crime; Machine learning; IP networks; Intelligent maritime transportation systems (MTS); distributed denial of service attack (DDoS); dual-stack machine learning; entropy features;
D O I
10.1109/TITS.2022.3177772
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Things (IoTs) is envisaged to widely capture the realm of logistics and transportation services in future. The applications of ubiquitous IoTs have been extended to Maritime Transportation Systems (MTS) that spawned increasing security threats; posing serious fiscal concerns to stakeholders involved. Among these threats, Distributed Denial of Service Attack (DDoS) is ranked very high that can wreak havoc on IoT artifacts of the MTS networks. Timely and effective detection of such attacks is imperative for necessary mitigation. Conventional approaches exploit entropy of attributes in network traffic for detecting DDoS attacks. However, the majority of these approaches are static in nature and consider only a few network traffic parameters, limiting the number of DDoS attack detection to a few types and intensities. In current research, a novel framework named "Dual Stack Machine Learning (S2ML) " has been proposed to calculate distinct entropy-based varying 10-Tuple (T) features from network traffic features, three window sizes and associated Rate of Exponent Separation (RES). These features have been exploited for developing an intelligent model over MTS-IoT datasets to successfully detect multiple types of DDoS attacks in MTS. S2ML is an efficient framework that overcomes the shortcomings of prevalent DDoS detection approaches, as evident from the comparison with Multi-layer Perceptron (MLP), Alternating Decision Tree (ADT) and Simple Logistic Regression (SLR) over different evaluation metrics (Confusion metrics, ROCs). The proposed S2ML technique outperforms prevalent ones with 1.5% better results compared to asserted approaches on distribution of normal/attack traffic. We look forward to enhancing the model performance through dynamic windowing, measuring packet drop rates and infrastructure of Software Defined Networks (SDNs).
引用
收藏
页码:2482 / 2491
页数:10
相关论文
共 28 条
[11]  
Jingcheng Gao, 2015, International Journal of Security and Networks, V10, P151
[12]  
Koay A, 2018, 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P162, DOI 10.1109/ICOIN.2018.8343104
[13]  
Kumari P, 2017, INT CONF COMMUN SYST, P514, DOI 10.1109/COMSNETS.2017.7945445
[14]   Mining anomalies using traffic feature distributions [J].
Lakhina, A ;
Crovella, M ;
Diot, C .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (04) :217-228
[15]   DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy [J].
Ma, Xinlei ;
Chen, Yonghong .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (01) :114-117
[16]  
Mahmood Z, 2020, CONNECTED VEHICLES I, P3, DOI DOI 10.1007/978-3-030-36167-91
[17]  
Maritime Transportation System (MTS), IMPR US MAR TRANSP S
[18]  
McHugh J, 2000, LECT NOTES COMPUT SC, V1907, P145
[19]   An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things [J].
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4815-4830
[20]   Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain [J].
Nawaz, Anum ;
Pena Queralta, Jorge ;
Guan, Jixin ;
Awais, Muhammad ;
Gia, Tuan Nguyen ;
Bashir, Ali Kashif ;
Kan, Haibin ;
Westerlund, Tomi .
SENSORS, 2020, 20 (14) :1-17