scispace - formally typeset
Search or ask a question

Showing papers on "Denial-of-service attack published in 2021"


Journal ArticleDOI
TL;DR: An event-based secure leader-following consensus control protocol is first developed for multiagent systems (MASs) subjected to multiple cyber attacks by using the Lyapunov stability theory to ensure the mean-square exponential consensus of MASs.
Abstract: This article concentrates on event-based secure leader-following consensus control for multiagent systems (MASs) with multiple cyber attacks, which contain replay attacks and denial-of-service (DoS) attacks. A new multiple cyber-attacks model is first built by considering replay attacks and DoS attacks simultaneously. Different from the existing researches on MASs with a fixed topological graph, the changes of communication topologies caused by DoS attacks are considered for MASs. Besides, an event-triggered mechanism is adopted for mitigating a load of network bandwidth by scheduling the transmission of sampled data. Then, an event-based consensus control protocol is first developed for MASs subjected to multiple cyber attacks. In view of this, by using the Lyapunov stability theory, sufficient conditions are obtained to ensure the mean-square exponential consensus of MASs. Furthermore, the event-based controller gain is derived by solving a set of linear matrix inequalities. Finally, an example is simulated for confirming the effectiveness of the theoretical results.

120 citations


Journal ArticleDOI
TL;DR: This article proposes a consolidated framework, by utilizing deep convolutional neural networks (CNNs) and real network data, to provide early detection for distributed denial-of-service (DDoS) attacks orchestrated by a botnet that controls malicious devices.
Abstract: With the advent of 5G, cyber–physical systems (CPSs) employed in the vertical industries and critical infrastructures will depend on the cellular network more than ever; making their attack surface wider. Hence, guarding the network against cyberattacks is critical not only for its primary subscribers but to prevent it from being exploited as a proxy to attack CPSs. In this article, we propose a consolidated framework, by utilizing deep convolutional neural networks (CNNs) and real network data, to provide early detection for distributed denial-of-service (DDoS) attacks orchestrated by a botnet that controls malicious devices. These puppet devices individually perform silent call, signaling, SMS spamming, or a blend of these attacks targeting call, Internet, SMS, or a blend of these services, respectively, to cause a collective DDoS attack in a cell that can disrupt CPSs’ operations. Our results demonstrate that our framework can achieve higher than $91\%$ normal and underattack cell detection accuracy.

107 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a defensive mechanism for DDoS attacks that is based on variations in entropy between DDoS attack and a normal traffic with a low computational overhead, which achieved a high detection rate with 98.2% over variable attack rate along with 0.04% false positive rate.
Abstract: Software defined networks (SDNs) in a combination of cloud computing are the best amalgamation for the researchers and industry. Though, these unique networking paradigms have been accepted world widely, they are hampered by various security threats. Among all the threats, the attack, Distributed Denial-of-Service (DDoS) is the most severe attack into the SDN-Cloud. In spite of, so many developments in tools and technology, it is still hard to detect the DDoS attack. Therefore, till now there is no efficient solution to cope up with this problem. In our research work, we proposed a defensive mechanism for DDoS attacks that is based on variations in entropy between DDoS attack and a normal traffic with a low computational overhead. We also proposed a mitigation technique to reduce the severity of the attack. On comparing with the existing DDoS mechanisms, our proposed method holds three advantages as (i) detection rate is high, (ii) false positive rate is low and (iii) the mitigation ability. Simulations are carried out in mininet emulator with POX controller and open flow switches at different attack strength. Our proposed mechanism has achieved a high detection rate with 98.2% over variable attack rate along with 0.04% false positive rate.

95 citations


Journal ArticleDOI
TL;DR: A deep learning-based Intrusion Detection System (IDS) for ITS, in particular, to discover suspicious network activity of In-Vehicles Networks (IVN), vehicles to vehicles communications and vehicles to infrastructure (V2I) networks.
Abstract: Intelligent Transportation Systems (ITS), especially Autonomous Vehicles (AVs), are vulnerable to security and safety issues that threaten the lives of the people. Unlike manual vehicles, the security of communications and computing components of AVs can be compromised using advanced hacking techniques, thus barring AVs from the effective use in our routine lives. Once manual vehicles are connected to the Internet, called the Internet of Vehicles (IoVs), it would be exploited by cyber-attacks, like denial of service, sniffing, distributed denial of service, spoofing and replay attacks. In this article, we present a deep learning-based Intrusion Detection System (IDS) for ITS, in particular, to discover suspicious network activity of In-Vehicles Networks (IVN), vehicles to vehicles (V2V) communications and vehicles to infrastructure (V2I) networks. A Deep Learning architecture-based Long-Short Term Memory (LSTM) autoencoder algorithm is designed to recognize intrusive events from the central network gateways of AVs. The proposed IDS is evaluated using two benchmark datasets, i.e., the car hacking dataset for in-vehicle communications and the UNSW-NB15 dataset for external network communications. The experimental results demonstrated that our proposed system achieved over a 99% accuracy for detecting all types of attacks on the car hacking dataset and a 98% accuracy on the UNSW-NB15 dataset, outperforming other eight intrusion detection techniques.

92 citations


Journal ArticleDOI
TL;DR: A new method that consists of the three collector, entropy-based and classification sections and outperforms its counterparts in terms of accuracy in detecting DDoS attacks in SDN is presented.
Abstract: The distributed denial-of-service (DDoS) attack is a security challenge for the software-defined network (SDN) The different limitations of the existing DDoS detection methods include the dependency on the network topology, not being able to detect all DDoS attacks, applying outdated and invalid datasets and the need for powerful and costly hardware infrastructure Applying static thresholds and their dependency on old data in previous periods reduces their flexibility for new attacks and increases the attack detection time A new method detects DDoS attacks in SDN This method consists of the three collector, entropy-based and classification sections The experimental results obtained by applying the UNB-ISCX, CTU-13 and ISOT datasets indicate that this method outperforms its counterparts in terms of accuracy in detecting DDoS attacks in SDN

87 citations


Journal ArticleDOI
TL;DR: A novel high-efficient approach is proposed named DIDDOS to protect against real-world new type DDoS attacks using Gated Recurrent Unit (GRU) a type of Recurrent Neural Network (RNN).

85 citations


Journal ArticleDOI
TL;DR: In this article, a multi-fold survey of different security issues present in IoT layers: perception layer, network layer, support layer, application layer, with further focus on Distributed Denial of Service (DDoS) attacks.
Abstract: Internet of Things (IoT) technology is prospering and entering every part of our lives, be it education, home, vehicles, or healthcare. With the increase in the number of connected devices, several challenges are also coming up with IoT technology: heterogeneity, scalability, quality of service, security requirements, and many more. Security management takes a back seat in IoT because of cost, size, and power. It poses a significant risk as lack of security makes users skeptical towards using IoT devices. This, in turn, makes IoT vulnerable to security attacks, ultimately causing enormous financial and reputational losses. It makes up for an urgent need to assess present security risks and discuss the upcoming challenges to be ready to face the same. The undertaken study is a multi-fold survey of different security issues present in IoT layers: perception layer, network layer, support layer, application layer, with further focus on Distributed Denial of Service (DDoS) attacks. DDoS attacks are significant threats for the cyber world because of their potential to bring down the victims. Different types of DDoS attacks, DDoS attacks in IoT devices, impacts of DDoS attacks, and solutions for mitigation are discussed in detail. The presented review work compares Intrusion Detection and Prevention models for mitigating DDoS attacks and focuses on Intrusion Detection models. Furthermore, the classification of Intrusion Detection Systems, different anomaly detection techniques, different Intrusion Detection System models based on datasets, various machine learning and deep learning techniques for data pre-processing and malware detection has been discussed. In the end, a broader perspective has been envisioned while discussing research challenges, its proposed solutions, and future visions.

85 citations


Journal ArticleDOI
TL;DR: The proposed research presents a lightweight and anonymity-preserving user authentication protocol to counter these security threats to the IoT networks’ security and privacy.
Abstract: Internet of Things (IoT) produces massive heterogeneous data from various applications, including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor nodes are integrated with the medical equipment to enable the health workers to monitor the patients’ health condition and appliances in real-time. However, due to security vulnerabilities, an unauthorized user can access health-related information or control the IoT nodes attached to the patient’s body resulting in unprecedented outcomes. Due to wireless channels as a medium of communication, IoT poses several threats such as a denial of service attack, man-in-the-middle attack, and modification attack to the IoT networks’ security and privacy. The proposed research presents a lightweight and anonymity-preserving user authentication protocol to counter these security threats. The given scheme establishes a secure session for the legitimate user and prohibits unauthorized users from gaining access to the IoT sensor nodes. The proposed protocol uses only lightweight cryptography primitives (hash) to alleviate the node’s tiny processor burden. The proposed protocol is efficient and superior because it has low computational and communication costs than conventional protocols. The proposed scheme uses password protection to let only the legitimate user access the IoT sensor nodes to obtain the patient’s real-time health report.

83 citations


Journal ArticleDOI
TL;DR: A deep learning-based intrusion detection system for DDoS attacks based on three models, namely, convolutional neural networks, deep neural Networks, and recurrent neural networks are proposed.
Abstract: Smart Agriculture or Agricultural Internet of things, consists of integrating advanced technologies (e.g., NFV, SDN, 5G/6G, Blockchain, IoT, Fog, Edge, and AI) into existing farm operations to improve the quality and productivity of agricultural products. The convergence of Industry 4.0 and Intelligent Agriculture provides new opportunities for migration from factory agriculture to the future generation, known as Agriculture 4.0. However, since the deployment of thousands of IoT based devices is in an open field, there are many new threats in Agriculture 4.0. Security researchers are involved in this topic to ensure the safety of the system since an adversary can initiate many cyber attacks, such as DDoS attacks to making a service unavailable and then injecting false data to tell us that the agricultural equipment is safe but in reality, it has been theft. In this paper, we propose a deep learning-based intrusion detection system for DDoS attacks based on three models, namely, convolutional neural networks, deep neural networks, and recurrent neural networks. Each model’s performance is studied within two classification types (binary and multiclass) using two new real traffic datasets, namely, CIC-DDoS2019 dataset and TON_IoT dataset, which contain different types of DDoS attacks.

82 citations


Journal ArticleDOI
TL;DR: A new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design, and an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource.
Abstract: The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.

77 citations


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a distributed model-free adaptive control (DMFAC) algorithm for learning nonlinear multiagent systems (MASs) subjected to denial-of-service (DoS) attacks.
Abstract: This article addresses the distributed model-free adaptive control (DMFAC) problem for learning nonlinear multiagent systems (MASs) subjected to denial-of-service (DoS) attacks. An improved dynamic linearization method is proposed to obtain an equivalent linear data model for learning systems. To alleviate the influence of DoS attacks, an attack compensation mechanism is developed. Based on the equivalent linear data model and the attack compensation mechanism, a novel learning-based DMFAC algorithm is developed to resist DoS attacks, which provides a unified framework to solve the leaderless consensus control, the leader-following consensus control, and the containment control problems. Finally, simulation examples are shown to illustrate the effectiveness of the developed DMFAC algorithm.

Journal ArticleDOI
TL;DR: A novel distributed ensemble design based IDS using Fog computing, which combines k-nearest neighbors, XGBoost, and Gaussian naive Bayes as first-level individual learners and the prediction results obtained from first level is used by Random Forest for final classification.
Abstract: With the development of internet of things (IoT), capabilities of computing, networking infrastructure, storage of data and management have come very close to the edge of networks. This has accelerated the necessity of Fog computing paradigm. Due to availability of Internet, most of our business operations are integrated with IoT platform. Fog computing has enhanced the strategy of collecting and processing, huge amount of data. On the other hand, attacks and malicious activities has adverse consequences on the development of IoT, Fog, and cloud computing. This has led to development of many security models using fog computing to protect IoT network. Therefore, for dynamic and highly scalable IoT environment, a distributed architecture based intrusion detection system (IDS) is required that can distribute the existing centralized computing to local fog nodes and can efficiently detect modern IoT attacks. This paper proposes a novel distributed ensemble design based IDS using Fog computing, which combines k-nearest neighbors, XGBoost, and Gaussian naive Bayes as first-level individual learners. At second-level, the prediction results obtained from first level is used by Random Forest for final classification. Most of the existing proposals are tested using KDD99 or NSL-KDD dataset. However, these datasets are obsolete and lack modern IoT-based attacks. In this paper, UNSW-NB15 and actual IoT-based dataset namely, DS2OS are used for verifying the effectiveness of the proposed system. The experimental result revealed that the proposed distributed IDS with UNSW-NB15 can achieve higher detection rate upto 71.18% for Backdoor, 68.98% for Analysis, 92.25% for Reconnaissance and 85.42% for DoS attacks. Similarly, with DS2OS dataset, detection rate is upto 99.99% for most of the attack vectors.

Journal ArticleDOI
TL;DR: In this paper, machine learning (ML) methods were used for constructing a high level of security capabilities based on intrusion detection systems (IDSs) for vehicular ad hoc networks (VANETs) that enable vehicles to communicate over the wireless communication infrastructure.
Abstract: Vehicular ad hoc networks (VANETs) are a subsystem of the proposed intelligent transportation system (ITS) that enables vehicles to communicate over the wireless communication infrastructure. VANETs are used in multiple applications, such as improving traffic safety and collision prevention. The use of VANETs makes the network vulnerable to various types of attacks, such as denial of service (DoS) and distributed denial of service (DDoS). Many researchers are now interested in adding a high level of security to VANETs. Machine learning (ML) methods were used for constructing a high level of security capabilities based on intrusion detection systems (IDSs). Furthermore, the vast majority of existing research is based on NSL-KDD or KDD-CUP99 datasets. Recent attacks are not present in these datasets. As a result, we employed a realistic dataset called ToN-IoT that derived from a large-scale, heterogeneous IoT network. This work tested various ML methods in both binary and multi-class classification problems. We used the Chi-square (Chi2) technique was used for feature selection and the Synthetic minority oversampling technique (SMOTE) for class balancing. According to the results, the XGBoost method outperformed other ML methods.


Proceedings ArticleDOI
27 Jan 2021
TL;DR: In this paper, a machine learning technique namely Decision Tree and Support Vector Machine (SVM) is proposed to detect malicious traffic in SDN control layer, where the devices in the infrastructure layer controlled by the software.
Abstract: Software-defined network (SDN) is a network architecture that used to build, design the hardware components virtually. We can dynamically change the settings of network connections. In the traditional network, it's not possible to change dynamically, because it's a fixed connection. SDN is a good approach but still is vulnerable to DDoS attacks. The DDoS attack is menacing to the internet. To prevent the DDoS attack, the machine learning algorithm can be used. The DDoS attack is the multiple collaborated systems that are used to target the particular server at the same time. In SDN control layer is in the center that link with the application and infrastructure layer, where the devices in the infrastructure layer controlled by the software. In this paper, we propose a machine learning technique namely Decision Tree and Support Vector Machine (SVM) to detect malicious traffic. Our test outcome shows that the Decision Tree and Support Vector Machine (SVM) algorithm provides better accuracy and detection rate.

Journal ArticleDOI
TL;DR: The experiments carried out on the CICDDoS2019 dataset containing the current DDoS attack types created in 2019 showed that the attacks on network traffic were detected with 99.99% success and the attack types were classified with an accuracy rate of 94.57%.
Abstract: As a result of the increase in the services provided over the internet, it is seen that the network infrastructure is more exposed to cyber attacks. The most widely used of these attacks are Distributed Denial of Service (DDoS) attacks that easily disrupt services. The most important factor in the fight against DDoS attacks is the early detection and separation of network traffic. In this study, it is suggested to use the deep neural network (DNN) as a deep learning model that detects DDoS attacks on the sample of packets captured from network traffic. DNN model can work quickly and with high accuracy even in small samples because it contains feature extraction and classification processes in its structure and has layers that update itself as it is trained. As a result of the experiments carried out on the CICDDoS2019 dataset containing the current DDoS attack types created in 2019, it was observed that the attacks on network traffic were detected with 99.99% success and the attack types were classified with an accuracy rate of 94.57%. The high accuracy values obtained show that the deep learning model can be used effectively in combating DDoS attacks.

Journal ArticleDOI
TL;DR: A Bayesian game theory-based solution to empower service provider to maximize the social welfare by employing incentives and pricing rules on the users of a network and proposes Bayesian pricing and auction mechanism to achieve Bayesian Nash Equilibrium points in different scenarios.

Journal ArticleDOI
TL;DR: In this article, a distributed fault-tolerant resilient consensus problem for heterogeneous multiagent systems (MASs) under both physical failures and network denial-of-service (DoS) attacks is considered.
Abstract: In this article, we consider the distributed fault-tolerant resilient consensus problem for heterogeneous multiagent systems (MASs) under both physical failures and network denial-of-service (DoS) attacks. Different from the existing consensus results, the dynamic model of the leader is unknown for all followers in this article. To learn this unknown dynamic model under the influence of DoS attacks, a distributed resilient learning algorithm is proposed by using the idea of data-driven. Based on the learned dynamic model of the leader, a distributed resilient estimator is designed for each agent to estimate the states of the leader. Then, a new adaptive fault-tolerant resilient controller is designed to resist the effect of physical failures and network DoS attacks. Moreover, it is shown that the consensus can be achieved with the proposed learning-based fault-tolerant resilient control method. Finally, a simulation example is provided to show the effectiveness of the proposed method.

Journal ArticleDOI
TL;DR: This paper proposes to classify the benign traffic from DDoS attack traffic by using machine learning technique and shows that the hybrid model of Support Vector classifier with Random Forest (SVC-RF) classifies the traffic with the highest testing accuracy of 98.8% with a very low false alarm rate.

Journal ArticleDOI
TL;DR: Zhang et al. as discussed by the authors proposed an optimal approach named EDMOpti and a novel game-theoretical approach called EDMGame for mitigating edge DDoS attacks, which formulates the EDM problem as a potential EDM Game and employs a decentralized algorithm to find the Nash equilibrium as the solution.
Abstract: Edge computing (EC) is an emerging paradigm that extends cloud computing by pushing computing resources onto edge servers that are attached to base stations or access points at the edge of the cloud in close proximity with end-users Due to edge servers' geographic distribution, the EC paradigm is challenged by many new security threats, including the notorious distributed Denial-of-Service (DDoS) attack In the EC environment, edge servers usually have constrained processing capacities due to their limited sizes Thus, they are particularly vulnerable to DDoS attacks DDoS attacks in the EC environment render existing DDoS mitigation approaches obsolete with its new characteristics In this paper, we make the first attempt to tackle the edge DDoS mitigation (EDM) problem We model it as a constraint optimization problem and prove its NP-hardness To solve this problem, we propose an optimal approach named EDMOpti and a novel game-theoretical approach named EDMGame for mitigating edge DDoS attacks EDMGame formulates the EDM problem as a potential EDM Game that admits a Nash equilibrium and employs a decentralized algorithm to find the Nash equilibrium as the solution Through theoretical analysis and experimental evaluation, we demonstrate that our approaches can solve the EDM problem effectively and efficiently

Journal ArticleDOI
TL;DR: In this article, a novel intrusion detection approach for the IoT, through the adoption of a customised deep learning technique, is proposed, which utilizes a cutting-edge IoT dataset comprising IoT traces and realistic attack traffic, including denial of service, distributed denial of services, data gathering and data theft attacks.

Journal ArticleDOI
TL;DR: This paper reviews and systematizes the state-of-the-art solutions that address both DoS and DDoS attacks in SDNs through the lenses of intrinsic and extrinsic approaches, and surveys the different approaches and tools adopted to implement the revised solutions.

Journal ArticleDOI
TL;DR: In this article, the use of machine learning algorithms for traffic monitoring to detect malicious behavior in the network as part of network intrusion detection system (NIDS) through a software-defined network (SDN).
Abstract: Software-defined Networking (SDN) has recently developed and been put forward as a promising and encouraging solution for future internet architecture. Managed, the centralized and controlled network has become more flexible and visible using SDN. On the other hand, these advantages bring us a more vulnerable environment and dangerous threats, causing network breakdowns, systems paralysis, online banking frauds and robberies. These issues have a significantly destructive impact on organizations, companies or even economies. Accuracy, high performance and real-time systems are essential to achieve this goal successfully. Extending intelligent machine learning algorithms in a network intrusion detection system (NIDS) through a software-defined network (SDN) has attracted considerable attention in the last decade. Big data availability, the diversity of data analysis techniques, and the massive improvement in the machine learning algorithms enable the building of an effective, reliable and dependable system for detecting different types of attacks that frequently target networks. This study demonstrates the use of machine learning algorithms for traffic monitoring to detect malicious behavior in the network as part of NIDS in the SDN controller. Different classical and advanced tree-based machine learning techniques, Decision Tree, Random Forest and XGBoost are chosen to demonstrate attack detection. The NSL-KDD dataset is used for training and testing the proposed methods; it is considered a benchmarking dataset for several state-of-the-art approaches in NIDS. Several advanced preprocessing techniques are performed on the dataset in order to extract the best form of the data, which produces outstanding results compared to other systems. Using just five out of 41 features of NSL-KDD, a multi-class classification task is conducted by detecting whether there is an attack and classifying the type of attack (DDoS, PROBE, R2L, and U2R), accomplishing an accuracy of 95.95%.

Journal ArticleDOI
TL;DR: In this paper, a scalable distributed neural-network-based adaptive platooning design approach is proposed to achieve secure platooning control in the presence of intermittent denial-of-service (DoS) attacks.
Abstract: This article deals with the problem of secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks (VANETs) in the presence of intermittent denial-of-service (DoS) attacks. The platoon, which is wirelessly connected via directed vehicle-to-vehicle (V2V) communication, is composed of a group of following vehicles subject to unknown heterogeneous nonlinearities and external disturbance inputs, and a leading vehicle subject to unknown nonlinearity and external disturbance as well as an unknown control input. Under such a platoon setting, this article aims to accomplish secure distributed platoon formation tracking with the desired longitudinal spacing and the same velocities and accelerations guided by the leader regardless of the simultaneous presence of nonlinearities, uncertainties, and DoS attacks. First, a new logical data packet processor is developed on each vehicle to identify the intermittent DoS attacks via verifying the time-stamps of the received data packets. Then, a scalable distributed neural-network-based adaptive control design approach is proposed to achieve secure platooning control. It is proved that under the established design procedure, the vehicle state estimation errors and platoon tracking errors can be regulated to reside in small neighborhoods around zero. Finally, comparative simulation studies are provided to substantiate the effectiveness and merits of the proposed control design approach on maintaining the desired platooning performance and attack tolerance.

Journal ArticleDOI
TL;DR: A distributed denial of service (DDoS) attack represents a major threat to service providers as discussed by the authors, where a DDoS attack aims to disrupt and deny services to legitimate users by overwhelming the target with a massive number of malicious requests.
Abstract: A distributed denial of service (DDoS) attack represents a major threat to service providers. More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by overwhelming the target with a massive number of malicious requests. A cyberattack of this kind is likely to result in tremendous economic losses for businesses and service providers due to increasing both operating and financial costs. In recent years, machine learning (ML) techniques have been widely used to prevent DDoS attacks. Indeed, many defense systems have been transformed into smart and intelligent systems through the use of ML techniques, which allow them to defeat DDoS attacks. This paper analyzes recent studies concerning DDoS detection methods that have adapted single and hybrid ML approaches in modern networking environments. Additionally, the paper discusses different DDoS defense systems based on ML techniques that make use of a virtualized environment, including cloud computing, software-defined network, and network functions virtualization environments. As the development of the Internet of Things (IoT) has been the subject of significant research attention in recent years, the paper also discusses ML approaches as security solutions against DDoS attacks in IoT environments. Furthermore, the paper recommends a number of directions for future research. This paper is intended to assist the research community with the design and development of effective defense systems capable of overcoming different types of DDoS attacks.

Journal ArticleDOI
TL;DR: In this article, the authors present the implementation of a modular and flexible SDN-based architecture to detect transport and application layer DDoS attacks using multiple Machine Learning (ML) and Deep Learning (DL) models.
Abstract: Distributed Denial of Service (DDoS) attacks represent the most common and critical attacks targeting conventional and new generation networks, such as the Internet of Things (IoT), cloud computing, and fifth-generation (5G) communication networks. In recent years, DDoS attacks have become not only massive but also sophisticated. Software-Defined Networking (SDN) technology has demonstrated effectiveness in counter-measuring complex attacks since it provides flexibility on global network monitoring and inline network configuration. Although several works have proposed to detect DDoS attacks, most of them did not use up-to-date datasets that contain the newest threats. Furthermore, only a few previous works assessed their solutions using simulated scenarios, easing the migration to production networks. This document presents the implementation of a modular and flexible SDN-based architecture to detect transport and application layer DDoS attacks using multiple Machine Learning (ML) and Deep Learning (DL) models. Exploring diverse ML/DL methods allowed us to resolve which methods perform better under different attack types and conditions. We tested the ML/DL models using two up-to-date security datasets, namely CICDoS2017 and CICDDoS2019 datasets, and they showed accuracy above 99% on classifying unseen traffic (testing set). We also deployed a simulated environment using the network emulator Mininet and the Open Network Operating System (ONOS) SDN controller. In this experimental setup, we demonstrated high detection rates, above 98% for transport DDoS attacks and up to 95% for application-layer DDoS attacks.

Journal ArticleDOI
TL;DR: In this article, a novel intrusion detection system (IDS) based on the Tree-CNN hierarchical algorithm with the Soft-Root-Sign (SRS) activation function is proposed, which reduces the training time of the generated model for detecting DDoS, Infiltration, Brute Force, and Web attacks.
Abstract: Currently, with the increasing number of devices connected to the Internet, search for network vulnerabilities to attackers has increased, and protection systems have become indispensable. There are prevalent security attacks, such as the Distributed Denial of Service (DDoS), which have been causing significant damage to companies. However, through security attacks, it is possible to extract characteristics that identify the type of attack. Thus, it is essential to have fast and effective security identification models. In this work, a novel Intrusion Detection System (IDS) based on the Tree-CNN hierarchical algorithm with the Soft-Root-Sign (SRS) activation function is proposed. The model reduces the training time of the generated model for detecting DDoS, Infiltration, Brute Force, and Web attacks. For performance assessment, the model is implemented in a medium-sized company, analyzing the level of complexity of the proposed solution. Experimental results demonstrate that the proposed hierarchical model achieves a significant reduction in execution time, around 36%, and an average detection accuracy of 0.98 considering all the analyzed attacks. Therefore, the results of performance evaluation show that the proposed classifier based on Tree-CNN is of low complexity and requires less processing time and computational resources, outperforming other current IDS based on machine learning algorithms.

Journal ArticleDOI
21 Jun 2021
TL;DR: This article presents a DDoS traffic detection model that uses a boosting method of logistic model trees for different IoT device classes since the characteristics of the network traffic from each device class may have subtle variation(s).
Abstract: Distributed denial of service (DDoS) attacks remain challenging to mitigate in existing systems, including in-home networks that comprise different Internet of Things (IoT) devices. In this paper, we present a DDoS traffic detection model that uses a boosting method of logistic model trees for different IoT device classes. Specifically, a different version of the model will be generated and applied for each device class, since the characteristics of the network traffic from each device class may have subtle variation(s). As a case study, we explain how devices in a typical smart home environment can be categorized into four different classes (and in our context, Class 1 -very high level of traffic predictability, Class 2 -high level of traffic predictability, Class 3 -medium level of traffic predictability, and Class 4 -low level of traffic predictability). Findings from our evaluations show that the accuracy of our proposed approach is between 99.92% and 99.99% for these four device classes. In other words, we demonstrate that we can use device classes to help us more effectively detect DDoS traffic.

Journal ArticleDOI
TL;DR: An early DDoS detection tool is created by using SNORT IDS (Intrusion Detection System), integrated with popularly used SDN controllers (Opendaylight and Open Networking Operating System) and it is found that ODL takes minimum time to detect the successful DDoS attack and more time to go down than ONOS.
Abstract: Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, the need to protect the network from various attacks is becoming mandatory. Distributed Denial of Service (DDoS) in SDN is one such attack that is becoming a hurdle to its growth. Before the mitigation of DDoS attacks, the primary step is to detect them. In this paper, an early DDoS detection tool is created by using SNORT IDS (Intrusion Detection System). This tool is integrated with popularly used SDN controllers (Opendaylight and Open Networking Operating System). For the experimental setup, five different network scenarios are considered. In each scenario number of hosts, switches and data packets vary. For the creation of different hosts, switches the Mininet emulation tool is used whereas for generating the data packets four different penetration tools such as Hping3, Nping, Xerxes, Tor Hammer, LOIC are used. The generated data packets are ranging from (50,000 per second–2,50,000 per second) and the number of hosts/switches are ranging from (50–250) in every scenario respectively. The data traffic is bombarded towards the controllers and the evaluation of these packets is achieved by making use of Wireshark. The analysis of our DDoS detection system is performed on the basis of various parameters such as time to detect the DDoS attack, Round Trip Time (RTT), percentage of packet loss and type of DDoS attack. It is found that ODL takes minimum time to detect the successful DDoS attack and more time to go down than ONOS. Our tool ensures the timely detection of fast DDoS attacks which delivers the better performance of the SDN controller and not compromising the overall functionality of the entire network.

Journal ArticleDOI
TL;DR: In this paper, an observer-based event-triggered containment control problem for linear multiagent systems (MASs) under denial-of-service (DoS) attacks is studied.
Abstract: This article studies the observer-based event-triggered containment control problem for linear multiagent systems (MASs) under denial-of-service (DoS) attacks. In order to deal with situations where MASs states are unmeasurable, an improved separation method-based observer design method with less conservativeness is proposed to estimate MASs states. To save communication resources and achieve the containment control objective, a novel observer-based event-triggered containment controller design method based on observer states is proposed for MASs under the influence of DoS attacks, which can make the MASs resilient to DoS attacks. In addition, the Zeno behavior can be eliminated effectively by introducing a positive constant into the designed event-triggered mechanism. Finally, a practical example is presented to illustrate the effectiveness of the designed observer and the event-triggered containment controller.