Skip to main content

13.05.2024 | Original Article

Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model

verfasst von: M. Revathi, S. Kiruthika Devi

Erschienen in: International Journal of Machine Learning and Cybernetics

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) connects billions of devices. However, because of its heterogeneous system and broad connectivity, it is vulnerable to various intrusion challenges, resulting in data and financial loss. The IoT environment must be secured from such threats. This research proposes an SDN-enabled Deep-Learning-Driven System for IoT intrusion detection. Intrusion detection can detect unknown threats from network traffic and is a good network security measure. Most current network anomaly detection approaches use standard machine learning models like KNN and SVM. These approaches have some significant advantages, but they are not very accurate and rely on manual traffic design, which is outmoded in the age of big data. Our proposed Hybrid Deep Learning-based Intrusion Detection System (HDLIDS) addresses low accuracy and feature engineering issues. HDLIDS uses a novel Modified Hybrid Deep Belief Network with Weights (MHDBN-W) algorithm to detect existing and new cyberattacks. The MHDBN-W method consists of an MCL, a layer combining the MGBRBM and DNN-W algorithms, and an aggregator layer. The MHDBN-W technique has two phases: UL and SL of traffic features into normal and abnormal classes. The HDLIDS model is evaluated on the CICIDS2018 dataset compared to other conventional learning methods. It outperforms all other models in all performance criteria.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A Survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6:8182–8201CrossRef Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A Survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6:8182–8201CrossRef
2.
Zurück zum Zitat Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Valdés JF, Luna-Valero F (2020) Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach. Sensors (Basel) 20(3):816CrossRef Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Valdés JF, Luna-Valero F (2020) Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach. Sensors (Basel) 20(3):816CrossRef
3.
Zurück zum Zitat Singh J, Behal S (2020) Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput Sci Rev 37:100279CrossRef Singh J, Behal S (2020) Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions. Comput Sci Rev 37:100279CrossRef
4.
Zurück zum Zitat Papamartzivanos D, Gomez Marmol F, Kambourakis G (2019) Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7:13546–13560CrossRef Papamartzivanos D, Gomez Marmol F, Kambourakis G (2019) Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7:13546–13560CrossRef
5.
Zurück zum Zitat Aldwairi T, Perera D, Novotny MA (2018) An evaluation of the performance of restricted Boltzmann machines as a model for anomaly network intrusion detection. Comput Netw 144:111–119CrossRef Aldwairi T, Perera D, Novotny MA (2018) An evaluation of the performance of restricted Boltzmann machines as a model for anomaly network intrusion detection. Comput Netw 144:111–119CrossRef
6.
Zurück zum Zitat Elsaeidy A, Munasinghe KS, Sharma D, Jamalipour A (2018) Intrusion detection in smart cities using restricted Boltzmann machines. J Netw Comput Appl 135(6):76–83 Elsaeidy A, Munasinghe KS, Sharma D, Jamalipour A (2018) Intrusion detection in smart cities using restricted Boltzmann machines. J Netw Comput Appl 135(6):76–83
7.
Zurück zum Zitat Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener Comput Syst 100:779–796CrossRef Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener Comput Syst 100:779–796CrossRef
8.
Zurück zum Zitat Rawat DB, Reddy SR (2017) Software-defined networking architecture, security and energy efficiency: a survey. IEEE Commun Surv Tuts 19(1):325–346CrossRef Rawat DB, Reddy SR (2017) Software-defined networking architecture, security and energy efficiency: a survey. IEEE Commun Surv Tuts 19(1):325–346CrossRef
9.
Zurück zum Zitat Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the Internet of things. In: 2016 IEEE Symposium on Computers and Communication, pp 1109–1111 Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the Internet of things. In: 2016 IEEE Symposium on Computers and Communication, pp 1109–1111
10.
Zurück zum Zitat Nobakht M, Sivaraman V, Borelli R (2016) A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: International Conference on Availability, Reliability and Security, pp 147–156 Nobakht M, Sivaraman V, Borelli R (2016) A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: International Conference on Availability, Reliability and Security, pp 147–156
11.
Zurück zum Zitat Bull P, Austin R, Sharma M, Watson R (2016) Flow-based security for IoT devices using an SDN gateway. In: IEEE International Conference on Future Internet of Things and Cloud, pp 157–163 Bull P, Austin R, Sharma M, Watson R (2016) Flow-based security for IoT devices using an SDN gateway. In: IEEE International Conference on Future Internet of Things and Cloud, pp 157–163
12.
Zurück zum Zitat Tortonesi M, Michaelis J, Morelli A, Suri N, Baker MA (2016) SPF: an SDN-based middleware solution to mitigate the IoT information explosion. In: Proceedings of the IEEE Symposium on Computers and Communication, Messina, Italy, 27–30 June 2016, pp 435–442 Tortonesi M, Michaelis J, Morelli A, Suri N, Baker MA (2016) SPF: an SDN-based middleware solution to mitigate the IoT information explosion. In: Proceedings of the IEEE Symposium on Computers and Communication, Messina, Italy, 27–30 June 2016, pp 435–442
13.
Zurück zum Zitat Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017, pp 308–313 Özçelik M, Chalabianloo N, Gür G (2017) Software-defined edge defense against IoT-based DDoS. In: Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017, pp 308–313
14.
Zurück zum Zitat Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France, 1–2 July 2019, pp 1–9 Sarwar MA, Hussain M, Anwar MU, Ahmad M (2019) FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France, 1–2 July 2019, pp 1–9
15.
Zurück zum Zitat Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7:3559–3570CrossRef Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7:3559–3570CrossRef
16.
Zurück zum Zitat Sharma PK, Singh S, Park JH (2018) OpCloudSec: open cloud software-defined wireless network security for the Internet of Things. Comput Commun 122:1–8CrossRef Sharma PK, Singh S, Park JH (2018) OpCloudSec: open cloud software-defined wireless network security for the Internet of Things. Comput Commun 122:1–8CrossRef
17.
Zurück zum Zitat Diro AA, Chilamkurti N (2018) ’ Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti N (2018) ’ Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef
18.
Zurück zum Zitat Venkatraman S, Alazab M, Vinayakumar R (2019) ’A hybrid deep learning image-based analysis for effective malware detection. J Inj Secur Appl 47:377–389 Venkatraman S, Alazab M, Vinayakumar R (2019) ’A hybrid deep learning image-based analysis for effective malware detection. J Inj Secur Appl 47:377–389
19.
Zurück zum Zitat Aigner W et al (2017) Visual analytics: foundations and experiences in malware analysis. Empirical research for software security. CRC Press, pp 159–192 Aigner W et al (2017) Visual analytics: foundations and experiences in malware analysis. Empirical research for software security. CRC Press, pp 159–192
20.
Zurück zum Zitat Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373–30385CrossRef Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373–30385CrossRef
22.
Zurück zum Zitat Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for IoT networks. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp 256–265 Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A (2019) Deep learning-based intrusion detection for IoT networks. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, pp 256–265
23.
Zurück zum Zitat Alkadi O, Moustafa N, Turnbull B, Choo K-KR (2019) Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7:114607–114618CrossRef Alkadi O, Moustafa N, Turnbull B, Choo K-KR (2019) Mixture localization-based outliers models for securing data migration in cloud centers. IEEE Access 7:114607–114618CrossRef
26.
Zurück zum Zitat Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn 58(7):121–134CrossRef Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn 58(7):121–134CrossRef
27.
Zurück zum Zitat Shao H, Jiang H, Li X, Liang T (2016) Rolling bearing fault detection using continuous deep belief network with locally linear embedding. Comput Ind 96(61):27–39 Shao H, Jiang H, Li X, Liang T (2016) Rolling bearing fault detection using continuous deep belief network with locally linear embedding. Comput Ind 96(61):27–39
28.
Zurück zum Zitat Khalaf BA, Mostafa SA, Mustapha A, Mohammed MA, Abduallah WM (2019) Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7:51691–51713CrossRef Khalaf BA, Mostafa SA, Mustapha A, Mohammed MA, Abduallah WM (2019) Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7:51691–51713CrossRef
29.
Zurück zum Zitat Metropolis N, Rosenbluth A, Rosenbluth M, Teller A, Teller E (1953) Equations of state calculations by fast computing machines. J Chem Phys 21:1087–1091CrossRef Metropolis N, Rosenbluth A, Rosenbluth M, Teller A, Teller E (1953) Equations of state calculations by fast computing machines. J Chem Phys 21:1087–1091CrossRef
30.
Zurück zum Zitat Robert CP, Casella G (2004) Monte Carlo statistical methods. SpringerCrossRef Robert CP, Casella G (2004) Monte Carlo statistical methods. SpringerCrossRef
31.
Zurück zum Zitat Kamil Z, Robiah Y, Mostafa S, Bahaman N, Musa O, Al-rimy B (2021) Deep IoT-IDS: hybrid deep learning for enhancing IoT network intrusion detection. Comput Mater Contin 69:3945–3966 Kamil Z, Robiah Y, Mostafa S, Bahaman N, Musa O, Al-rimy B (2021) Deep IoT-IDS: hybrid deep learning for enhancing IoT network intrusion detection. Comput Mater Contin 69:3945–3966
32.
Zurück zum Zitat Ruder S (2016) An overview of gradient descent optimization algorithms. Sebastian Ruder Ruder S (2016) An overview of gradient descent optimization algorithms. Sebastian Ruder
33.
Zurück zum Zitat Sharafaldin I, Lashkari AH, Ali A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the He Fourth International Conference on Information Systems Security and Privacy (ICISSP), Madeira, Portugal, January 2018 Sharafaldin I, Lashkari AH, Ali A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the He Fourth International Conference on Information Systems Security and Privacy (ICISSP), Madeira, Portugal, January 2018
Metadaten
Titel
Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model
verfasst von
M. Revathi
S. Kiruthika Devi
Publikationsdatum
13.05.2024
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-024-02147-x