SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network

被引:3
作者
Ibrahim, Muhammad [1 ]
Hanif, Muhammad [2 ]
Ahmad, Shabir [3 ]
Jamil, Faisal [1 ]
Sehar, Tayyaba [2 ]
Lee, YunJung [4 ]
Kim, DoHyeun [1 ]
机构
[1] Jeju Natl Univ, Dept Comp Engn, Jeju Si 63243, Jeju Special Se, South Korea
[2] Virtual Univ Islamabad, Islamabad, Pakistan
[3] Gachon Univ, Dept IT Convergence Engn, Seongnam Si 461701, Gyeonggi Do, South Korea
[4] Jeju Natl Univ, Dept Comp Sci & Stat, Jeju City, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 03期
基金
新加坡国家研究基金会;
关键词
SDN; control plane; load balancing; decision tree; CPU utilization; BLOCKCHAIN; SYSTEM;
D O I
10.32604/cmc.2022.017772
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been widely adopted in various domains including smart cities, healthcare, smart factories, etc. In the last few years, the fitness industry has been reshaped by the introduction of smart fitness solutions for individuals as well as fitness gyms. The IoT fitness devices collect trainee data that is being used for various decision-making. However, it will face numerous security and privacy issues towards its realization. This work focuses on IoT security, especially DoS/DDoS attacks. In this paper, we have proposed a novel blockchain-enabled protocol (BEP) that uses the notion of a self-exposing node (SEN) approach for securing fitness IoT applications. The blockchain and SDN architectures are employed to enhance IoT security by a highly preventive security monitoring, analysis and response system. The proposed approach helps in detecting the DoS/DDoS attacks on the IoT fitness system and then mitigating the attacks. The BEP is used for handling Blockchain-related activities and SEN could be a sensor or actuator node within the fitness IoT system. SEN provides information about the inbound and outbound traffic to the BEP which is used to analyze the DoS/DDoS attacks on the fitness IoT system. The SEN calculates the inbound and outbound traffic features' entropies and transmits them to the Blockchain in the form of transaction blocks. The BEP picks the whole mined blocks' transactions and transfers them to the SDN controller node. The controller node correlates the entropies data of SENs and decides about the DoS or DDoS attack. So, there are two decision points, one is SEN, and another is the controller. To evaluate the performance of our proposed system, several experiments are performed and results concerning the entropy values and attack detection rate are obtained. The proposed approach has outperformed the other two approaches concerning the attack detection rate by an increase of 11% and 18% against Approach 1 and Approach 2 respectively.
引用
收藏
页码:5651 / 5665
页数:15
相关论文
共 26 条
[1]  
Abd Elazim NM, 2018, PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), P555, DOI 10.1109/ICCES.2018.8639429
[2]   Towards the Design of a Formal Verification and Evaluation Tool of Real-Time Tasks Scheduling of IoT Applications [J].
Ahmad, Shabir ;
Malik, Sehrish ;
Ullah, Israr ;
Park, Dong-Hwan ;
Kim, Kwangsoo ;
Kim, DoHyeun .
SUSTAINABILITY, 2019, 11 (01)
[3]   An Adaptive Approach Based on Resource-Awareness Towards Power-Efficient Real-Time Periodic Task Modeling on Embedded IoT Devices [J].
Ahmad, Shabir ;
Malik, Sehrish ;
Ullah, Israr ;
Fayaz, Muhammad ;
Park, Dong-Hwan ;
Kim, Kwangsoo ;
Kim, DoHyeun .
PROCESSES, 2018, 6 (07)
[4]   Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications [J].
Ahmad, Shabir ;
Hang, Lei ;
Kim, Do Hyeun .
SENSORS, 2018, 18 (02)
[5]  
Alketbi A, 2018, 2018 15TH LEARNING AND TECHNOLOGY CONFERENCE (L&T), P112, DOI 10.1109/LT.2018.8368494
[6]   Ensuring end-to-end QoS based on multi-paths routing using SDN technology [J].
Dutra, Diego Leonel Cadette ;
Bagaa, Miloud ;
Taleb, Tarik ;
Samdanis, Konstantinos .
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
[7]   Bubbles of Trust: A decentralized blockchain-based authentication system for IoT [J].
Hammi, Mohamed Tahar ;
Hammi, Badis ;
Bellot, Patrick ;
Serhrouchni, Ahmed .
COMPUTERS & SECURITY, 2018, 78 :126-142
[8]   A novel statistical analysis and autoencoder driven intelligent intrusion detection approach [J].
Ieracitano, Cosimo ;
Adeel, Ahsan ;
Morabito, Francesco Carlo ;
Hussain, Amir .
NEUROCOMPUTING, 2020, 387 :51-62
[9]   Blockchain based Data Integrity Service Framework for IoT data [J].
Liu, Bin ;
Yu, Xiao Liang ;
Chen, Shiping ;
Xu, Xiwei ;
Zhu, Liming .
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, :468-475
[10]  
Meshchikhin I. A., 2018, INT C ART INT MED EN, P705