Graph-Based DDoS Attack Detection in IoT Systems with Lossy Network (2403.09118v1)
Abstract: This study introduces a robust solution for the detection of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT) systems, leveraging the capabilities of Graph Convolutional Networks (GCN). By conceptualizing IoT devices as nodes within a graph structure, we present a detection mechanism capable of operating efficiently even in lossy network environments. We introduce various graph topologies for modeling IoT networks and evaluate them for detecting tunable futuristic DDoS attacks. By studying different levels of network connection loss and various attack situations, we demonstrate that the correlation-based hybrid graph structure is effective in spotting DDoS attacks, substantiating its good performance even in lossy network scenarios. The results indicate a remarkable performance of the GCN-based DDoS detection model with an F1 score of up to 91%. Furthermore, we observe at most a 2% drop in F1-score in environments with up to 50% connection loss. The findings from this study highlight the advantages of utilizing GCN for the security of IoT systems which benefit from high detection accuracy while being resilient to connection disruption.
- S. Balaji, K. Nathani, and R. Santhakumar, “Iot technology, applications and challenges: a contemporary survey,” Wireless personal communications, vol. 108, pp. 363–388, 2019.
- D. Reinsel, “How you contribute to today’s growing datasphere and its enterprise impact,” https://blogs.idc.com/2019/11/04/how-you-contribute-to-todays-growing-datasphere-and-its-enterprise-impact/, 2019, accessed: 09-11-2023.
- “Internet of things research study - 2014 report,” https://d-russia.ru/wp-content/uploads/2015/10/4AA5-4759ENW.pdf, accessed: 11-27-2022.
- W. H. Hassan et al., “Current research on internet of things (IoT) security: A survey,” Computer networks, vol. 148, pp. 283–294, 2019.
- W. Liu, “Research on dos attack and detection programming,” in 2009 Third International Symposium on Intelligent Information Technology Application, vol. 1. IEEE, 2009, pp. 207–210.
- J. Nazario, “Ddos attack evolution,” Network Security, vol. 2008, no. 7, pp. 7–10, 2008.
- K. Verma, H. Hasbullah, and A. Kumar, “An efficient defense method against udp spoofed flooding traffic of denial of service (dos) attacks in vanet,” in 2013 3rd IEEE International Advance Computing Conference (IACC), 2013, pp. 550–555.
- M. Suresh and R. Anitha, “Evaluating machine learning algorithms for detecting ddos attacks,” vol. 196, 07 2011, pp. 441–452.
- E. Bursztein, “Inside the infamous mirai iot botnet: A retrospective analysis,” https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/, 2017, accessed: 09-11-2023.
- J. Margolis, T. T. Oh, S. Jadhav, Y. H. Kim, and J. N. Kim, “An in-depth analysis of the mirai botnet,” in 2017 International Conference on Software Security and Assurance (ICSSA), 2017, pp. 6–12.
- T. Kelley and E. Furey, “Getting prepared for the next botnet attack : Detecting algorithmically generated domains in botnet command and control,” in 2018 29th Irish Signals and Systems Conference (ISSC), 2018, pp. 1–6.
- R. Vishwakarma and A. K. Jain, “A survey of ddos attacking techniques and defence mechanisms in the iot network,” Telecommunication Systems, vol. 73, pp. 3–25, 1 2020. [Online]. Available: https://link.springer.com/article/10.1007/s11235-019-00599-z
- A. Hekmati, N. Jethwa, E. Grippo, and B. Krishnamachari, “Correlation-aware neural networks for ddos attack detection in iot systems,” arXiv preprint arXiv:2302.07982, 2023.
- A. Hekmati, E. Grippo, and B. Krishnamachari, “Neural networks for ddos attack detection using an enhanced urban iot dataset,” in 2022 International Conference on Computer Communications and Networks (ICCCN). IEEE, 2022, pp. 1–8.
- T. N. Kipf and M. Welling, “Semi-supervised classification with graph convolutional networks,” arXiv preprint arXiv:1609.02907, 2016.
- A. Hekmati and B. Krishnamachari, “Graph convolutional networks for ddos attack detection in a lossy network,” IEEE International Conference on Machine Learning for Communication and Networking (IEEE ICMLCN), 2024.
- R. Doshi, N. Apthorpe, and N. Feamster, “Machine learning ddos detection for consumer internet of things devices,” in 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 29–35.
- Y.-W. Chen, J.-P. Sheu, Y.-C. Kuo, and N. Van Cuong, “Design and implementation of iot ddos attacks detection system based on machine learning,” in 2020 European Conference on Networks and Communications (EuCNC), 2020, pp. 122–127.
- S. S. Mohammed, R. Hussain, O. Senko, B. Bimaganbetov, J. Lee, F. Hussain, C. A. Kerrache, E. Barka, and M. Z. Alam Bhuiyan, “A new machine learning-based collaborative ddos mitigation mechanism in software-defined network,” in 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2018, pp. 1–8.
- N. F. Syed, Z. Baig, A. Ibrahim, and C. Valli, “Denial of service attack detection through machine learning for the iot,” Journal of Information and Telecommunication, vol. 4, no. 4, pp. 482–503, 2020. [Online]. Available: https://doi.org/10.1080/24751839.2020.1767484
- S. Zhang, H. Tong, J. Xu, and R. Maciejewski, “Graph convolutional networks: a comprehensive review,” Computational Social Networks, vol. 6, no. 1, pp. 1–23, 2019.
- Y. Cao, H. Jiang, Y. Deng, J. Wu, P. Zhou, and W. Luo, “Detecting and mitigating ddos attacks in sdn using spatial-temporal graph convolutional network,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3855–3872, 2022.
- T. Field, U. Harder, and P. Harrison, “Network traffic behaviour in switched ethernet systems,” in Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems. IEEE, 2002, pp. 33–42.
- Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher, and Y. Elovici, “N-baiot—network-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, 2018.