Design of an IoT DDoS attack prediction system based on data mining technology

被引:16
作者
Huang, Lingfeng [1 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 52380, Peoples R China
关键词
Data mining; Internet of things (IoT); Cyberattack; Distributed denial-of-service (DDoS);
D O I
10.1007/s11227-021-04055-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rise of the Internet of things (IoT), the threat to information security extends from general servers to IoT devices. Possible IoT security issues include all kinds of network attacks. Distributed denial-of-service (DDoS) attacks are notoriously difficult to prevent. With the continuous evolution of DDoS attacks, from simple network packet attacks, it has become possible for hackers to hide in legitimate paths. At times, large numbers of non-legitimate attack packets can occur, which can be a major problem that enterprises cannot protect themselves against. This paper proposes a data-mining technology-based DDoS attack prediction system, designed for use in the IoT environment. The system can be divided into two major modules: 1. the DDoS attack prediction model-construction module and 2. the DDoS attack prediction defence module. In the DDoS attack prediction model-construction module, through the integration of data-mining classification technology, the SVM algorithm is used to dig out the classification basis of a possible attack. The attack prediction model is then established, and the prediction result is corrected in real time. The results of the study conducted showed that when an attacker attempts to launch an attack, the system design will predict the timing of the DDoS attack, and existing IP backtracking technology can be used to track the source of the attack, block the source of the attack in advance and achieve the purpose of defence.
引用
收藏
页码:4601 / 4623
页数:23
相关论文
共 36 条
[1]  
Andika B, 2020, BLACKLISTED IP DISTR, DOI 10.1109/ITIS50118.2020.9320996
[2]  
Barki L, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2576, DOI 10.1109/ICACCI.2016.7732445
[3]  
CHEN X, 2021, IEEE TRANS CLOUD COM
[4]   DNNOff: Offloading DNN-Based Intelligent IoT Applications in Mobile Edge Computing [J].
Chen, Xing ;
Li, Ming ;
Zhong, Hao ;
Ma, Yun ;
Hsu, Ching-Hsien .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) :2820-2829
[5]   Self-adaptive resource allocation for cloud-based software services based on iterative QoS prediction model [J].
Chen, Xing ;
Wang, Haijiang ;
Ma, Yun ;
Zheng, Xianghan ;
Guo, Longkun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 :287-296
[6]   Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model [J].
Chen, Xing ;
Lin, Junxin ;
Ma, Yun ;
Lin, Bing ;
Wang, Haijiang ;
Huang, Gang .
SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (11)
[7]   An adaptive offloading framework for Android applications in mobile edge computing [J].
Chen, Xing ;
Chen, Shihong ;
Ma, Yun ;
Liu, Bichun ;
Zhang, Ying ;
Huang, Gang .
SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (08)
[8]   Runtime model based approach to IoT application development [J].
Chen, Xing ;
Li, Aipeng ;
Zeng, Xue'e ;
Guo, Wenzhong ;
Huang, Gang .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (04) :540-553
[9]  
Cheskidov P, 2019, 2019 INT MULT IND EN, V3
[10]   DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks [J].
Dong, Shi ;
Sarem, Mudar .
IEEE ACCESS, 2020, 8 :5039-5048