NFDLM: A Lightweight Network Flow based Deep Learning Model for DDoS Attack Detection in IoT Domains

被引:0
作者
Saurabh, Kumar [1 ]
Kumar, Tanuj [1 ]
Singh, Uphar [1 ]
Vyasl, O. P. [1 ]
Khondoker, Rahamatullah [2 ]
机构
[1] Indian Inst Informat Technol, Allahabad, Uttar Pradesh, India
[2] THM Univ Appl Sci, Dept Business Informat, Friedberg, Germany
来源
2022 IEEE WORLD AI IOT CONGRESS (AIIOT) | 2022年
关键词
IoT; Botnets; DDoS; ANN; LSTM; MUTUAL INFORMATION; NEURAL-NETWORKS; DESIGN;
D O I
10.1109/AIIOT54504.2022.9817297
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the recent years, Distributed Denial of Service (DDoS) attacks on Internet of Things (IoT) devices have become one of the prime concerns to Internet users around the world. One of the sources of the attacks on IoT ecosystems are botnets. Intruders force IoT devices to become unavailable for its legitimate users by sending large number of messages within a short interval. This study proposes NFDLM, a lightweight and optimised Artificial Neural Network (ANN) based Distributed Denial of Services (DDoS) attack detection framework with mutual correlation as feature selection method which produces a superior result when compared with Long Short Term Memory (LSTM) and simple ANN. Overall, the detection performance achieves approximately 99% accuracy for the detection of attacks from botnets. In this work, we have designed and compared four different models where two are based on ANN and the other two are based on LSTM to detect the attack types of DDoS.
引用
收藏
页码:736 / 742
页数:7
相关论文
共 37 条
  • [1] Machine learning approaches to IoT security: A systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    [J]. INTERNET OF THINGS, 2021, 14
  • [2] Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. COMPLEXITY, 2021, 2021
  • [3] [Anonymous], FORTIGUARD LABS THRE
  • [4] A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems
    Benkhelifa, Elhadj
    Welsh, Thomas
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3496 - 3509
  • [5] Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
    Caviglione, Luca
    Choras, Michal
    Corona, Igino
    Janicki, Artur
    Mazurczyk, Wojciech
    Pawlicki, Marek
    Wasielewska, Katarzyna
    [J]. IEEE ACCESS, 2021, 9 : 5371 - 5396
  • [6] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [7] IoTDefender: A Federated Transfer Learning Intrusion Detection Framework for 5G IoT
    Fan, Yulin
    Li, Yang
    Zhan, Mengqi
    Cui, Huajun
    Zhang, Yan
    [J]. 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 88 - 95
  • [8] RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Ahmim, Ahmed
    Derdour, Makhlouf
    Janicke, Helge
    [J]. FUTURE INTERNET, 2020, 12 (03)
  • [9] Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Moschoyiannis, Sotiris
    Janicke, Helge
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [10] LSTM: A Search Space Odyssey
    Greff, Klaus
    Srivastava, Rupesh K.
    Koutnik, Jan
    Steunebrink, Bas R.
    Schmidhuber, Juergen
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (10) : 2222 - 2232