DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment

被引:7
作者
Chen, Hongsong [1 ]
Meng, Caixia [2 ]
Chen, Jingjiu [3 ]
机构
[1] Univ Sci & Technol, Dept Comp Sci, Beijing, Peoples R China
[2] Railway Police Coll, Zhengzhou, Peoples R China
[3] Univ Sci & Technol Beijing, Beijing, Peoples R China
关键词
DDoS Detection; IoT; Machine Learning; RNN; Statistics Analysis;
D O I
10.4018/IJISP.2021070101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Aiming at the problem of DDoS attack detection in internet of things (IoT) environment, statistical and machine-learning algorithms are proposed to model and analyze the network traffic of DDoS attack. Docker-based virtualization platform is designed and configured to collect IoT network traffic data. Then the packet-level, flow-level, and second-level network traffic datasets are generated, and the importance of features in different traffic datasets are sorted. By SKlearn and TensorFlow machine-learning software framework, different machine learning algorithms are researched and compared. In packet-level DDoS attack detection, KNN algorithm achieves the best results; the accuracy is 92.8%. In flow-level DDoS attack detection, the voting algorithm achieves the best results; the accuracy is 99.8%. In second-level DDoS attack detection, the RNN algorithm behaves best results; the accuracy is 97.1%. The DDoS attack detection method combined with statistical analysis and machine-learning can effectively detect large-scale DDoS attacks on the internet of things simulation experimental environment.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 20 条
[1]   Low rate cloud DDoS attack defense method based on power spectral density analysis [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
INFORMATION PROCESSING LETTERS, 2018, 138 :44-50
[2]  
[Anonymous], 2017, MACHINE LEARNING PYT
[3]   Detection of Mirai by Syntactic and Behavioral Analysis [J].
Ben Said, Najah ;
Biondi, Fabrizio ;
Bontchev, Vesselin ;
Decourbe, Olivier ;
Given-Wilson, Thomas ;
Legay, Axel ;
Quilbeuf, Jean .
2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2018, :224-235
[4]  
Bhardwaj K., 2018, USENIX WORKSH HOT TO
[5]  
Bhosale KS, 2017, 2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), P136, DOI 10.1109/TELSKS.2017.8246247
[6]  
Hoang DH, 2018, INT CONF ADV COMMUN, P381, DOI 10.23919/ICACT.2018.8323766
[7]   Machine Learning DDoS Detection for Consumer Internet of Things Devices [J].
Doshi, Rohan ;
Apthorpe, Noah ;
Feamster, Nick .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :29-35
[8]  
Duravkin I, 2014, 2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), P171, DOI 10.1109/INFOCOMMST.2014.6992341
[9]  
Hachinyan O, 2018, PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), P1500, DOI 10.1109/EIConRus.2018.8317382
[10]  
Hilton Scott, 2016, Dyn