Detection of DDoS attack in IoT traffic using ensemble machine learning techniques

被引:5
作者
Pandey, Nimisha [1 ]
Mishra, Pramod Kumar [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Dept Comp Sci, Varanasi 221005, Uttar Pradesh, India
关键词
DDoS attacks; random forest; gradient boosting; Pearson correlation coefficient; extra trees classifier; IoT; IoT security; TECHNOLOGIES; MITIGATION; HOME;
D O I
10.3934/nhm.2023061
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A denial-of-service (DoS) attack aims to exhaust the resources of the victim by sending attack packets and ultimately stop the legitimate packets by various techniques. The paper discusses the consequences of distributed denial-of-service (DDoS) attacks in various application areas of Internet of Things (IoT). In this paper, we have analyzed the performance of machine learning(ML)-based classifiers including bagging and boosting techniques for the binary classification of attack traffic. For the analysis, we have used the benchmark CICDDoS2019 dataset which deals with DDoS attacks based on User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) in order to study new kinds of attacks. Since these protocols are widely used for communication in IoT networks, this data has been used for studying DDoS attacks in the IoT domain. Since the data is highly unbalanced, class balancing is done using an ensemble sampling approach comprising random under-sampler and ADAptive SYNthetic (ADASYN) oversampling technique. Feature selection is achieved using two methods, i.e., (a) Pearson correlation coefficient and (b) Extra Tree classifier. Further, performance is evaluated for ML classifiers viz. Random Forest (RF), Nai & BULL;ve Bayes (NB), support vector machine (SVM), AdaBoost, eXtreme Gradient Boosting (XGBoost) and Gradient Boosting (GB) algorithms. It is found that RF has given the best performance with the least training and prediction time. Further, it is found that feature selection using extra trees classifier is more efficient as compared to the Pearson correlation coefficient method in terms of total time required in training and prediction for most classifiers. It is found that RF has given best performance with least time along with feature selection using Pearson correlation coefficient in attack detection.
引用
收藏
页码:1393 / 1408
页数:16
相关论文
共 29 条
[1]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[2]   Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things [J].
Alimi, Kuburat Oyeranti Adefemi ;
Ouahada, Khmaies ;
Abu-Mahfouz, Adnan M. ;
Rimer, Suvendi ;
Alimi, Oyeniyi Akeem .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
[3]   A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense [J].
Dahiya, Amrita ;
Gupta, Brij B. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 117 :193-204
[4]   Near real-time security system applied to SDN environments in IoT networks using convolutional neural network [J].
de Assis, Marcos V. O. ;
Carvalho, Luiz F. ;
Rodrigues, Joel J. P. C. ;
Lloret, Jaime ;
Proenca Jr, Mario L. .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
[5]   Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning [J].
de Lima Filho, Francisco Sales ;
Silveira, Frederico A. F. ;
Brito Junior, Agostinho de Medeiros ;
Vargas-Solar, Genoveva ;
Silveira, Luiz F. .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[6]   Active learning to detect DDoS attack using ranked features [J].
Deka, Rup Kumar ;
Bhattacharyya, Dhruba Kumar ;
Kalita, Jugal Kumar .
COMPUTER COMMUNICATIONS, 2019, 145 :203-222
[7]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[8]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[9]   The Vulnerability of the Production Line Using Industrial IoT Systems under DDoS Attack [J].
Horak, Tibor ;
Strelec, Peter ;
Huraj, Ladislav ;
Tanuska, Pavol ;
Vaclavova, Andrea ;
Kebisek, Michal .
ELECTRONICS, 2021, 10 (04) :1-32
[10]   The hybrid technique for DDoS detection with supervised learning algorithms [J].
Hosseini, Soodeh ;
Azizi, Mehrdad .
COMPUTER NETWORKS, 2019, 158 :35-45