A BiLSTM-Based DDoS Attack Detection Method for Edge Computing

被引:10
作者
Zhang, Yiying [1 ]
Liu, Yiyang [1 ]
Guo, Xiaoyan [2 ]
Liu, Zhu [3 ]
Zhang, Xiankun [1 ]
Liang, Kun [1 ]
机构
[1] Tianjin Univ Sci Technol, Coll Artificial Intelligence, Tianjin 300457, Peoples R China
[2] State Grid Tianjin Elect Power Co, Informat & Commun Co, Tianjin 300140, Peoples R China
[3] State Grid Informat & Commun Ind Grp Co Ltd, Beijing 100070, Peoples R China
关键词
distributed denial of service attacks; attack detection; edge computing; bidirectional long short-term memory; power Internet of Things; LEARNING APPROACH;
D O I
10.3390/en15217882
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at risk. The traffic generated by Distributed Denial of Service (DDoS) attacks is characterised by short bursts of time, making it difficult to apply existing centralised detection methods that rely on manual setting of attack characteristics to changing attack scenarios. In this paper, a DDoS attack detection model based on Bidirectional Long Short-Term Memory (BiLSTM) is proposed by constructing an edge detection framework, which achieves bi-directional contextual information extraction of the network environment using the BiLSTM network and automatically learns the temporal characteristics of the attack traffic in the original data traffic. This paper takes the DDoS attack in the power Internet of Things as the research object. Simulation results show that the model outperforms traditional advanced models such as Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) in terms of accuracy, false detection rate, and time delay. It plays an auxiliary role in the security protection of the power Internet of Things and effectively improves the reliability of the power grid.
引用
收藏
页数:17
相关论文
共 32 条
[11]   Semi-supervised machine learning approach for DDoS detection [J].
Idhammad, Mohamed ;
Afdel, Karim ;
Belouch, Mustapha .
APPLIED INTELLIGENCE, 2018, 48 (10) :3193-3208
[12]  
Jiang W., 2020, COMPUT MOD, V5, P120
[13]  
Koay A, 2018, 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P162, DOI 10.1109/ICOIN.2018.8343104
[14]  
[李传煌 Li Chuanhuang], 2018, [通信学报, Journal on Communications], V39, P176
[15]  
Luo Hua, 2007, Journal of Computer Applications, V27, P314
[16]  
Miao X., 2022, DATA COMMUN, P42
[17]   A two-stage intrusion detection system with auto-encoder and LSTMs [J].
Mushtaq, Earum ;
Zameer, Aneela ;
Umer, Muhammad ;
Abbasi, Asima Akber .
APPLIED SOFT COMPUTING, 2022, 121
[18]  
Odena A, 2016, Arxiv, DOI arXiv:1601.04033
[19]  
Ren Yilong, 2012, Computer Engineering and Applications, V48, P82, DOI 10.3778/j.issn.1002-8331.2012.31.019
[20]  
Shi L., 2019, AGR TECHNOL, V39, P40