scholarly journals Traffic flow features as metrics (TFFM): detection of application layer level DDOS attack scope of IOT traffic flows

2018 ◽  
Vol 7 (2.7) ◽  
pp. 203 ◽  
Author(s):  
Kalathiripi Rambabu ◽  
N Venkatram

The phenomenal and continuous growth of diversified IOT (Internet of Things) dependent networks has open for security and connectivity challenges. This is due to the nature of IOT devices, loosely coupled behavior of internetworking, and heterogenic structure of the networks.  These factors are highly vulnerable to traffic flow based DDOS (distributed-denial of services) attacks. The botnets such as “mirae” noticed in recent past exploits the IoT devises and tune them to flood the traffic flow such that the target network exhaust to response to benevolent requests. Hence the contribution of this manuscript proposed a novel learning-based model that learns from the traffic flow features defined to distinguish the DDOS attack prone traffic flows and benevolent traffic flows. The performance analysis was done empirically by using the synthesized traffic flows that are high in volume and source of attacks. The values obtained for statistical metrics are evincing the significance and robustness of the proposed model

2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

The concept of IoT (Internet of Things) assumes a continuous increase in the number of devices, which raises the problem of classifying them for different purposes. Based on their semantic characteristics, meaning, functionality or domain of usage, the system classes have been identified so far. This research purpose is to identify devices classes based on traffic flow characteristics such as the coefficient of variation of the received and sent data ratio. Such specified classes can combine devices based on behavior predictability and can serve as the basis for the creation of network management or network anomaly detection classification models. Four generic classes of IoT devices where defined by using the classification of the coefficient of variation method.


2021 ◽  
Vol 33 (6) ◽  
pp. 1-20
Author(s):  
Ivan Cvitić ◽  
Dragan Peraković ◽  
Marko Periša ◽  
Mirjana D. Stojanović

The concept of IoT (Internet of Things) assumes a continuous increase in the number of devices, which raises the problem of classifying them for different purposes. Based on their semantic characteristics, meaning, functionality or domain of usage, the system classes have been identified so far. This research purpose is to identify devices classes based on traffic flow characteristics such as the coefficient of variation of the received and sent data ratio. Such specified classes can combine devices based on behavior predictability and can serve as the basis for the creation of network management or network anomaly detection classification models. Four generic classes of IoT devices where defined by using the classification of the coefficient of variation method.


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 14
Author(s):  
James Dzisi Gadze ◽  
Akua Acheampomaa Bamfo-Asante ◽  
Justice Owusu Agyemang ◽  
Henry Nunoo-Mensah ◽  
Kwasi Adu-Boahen Opare

Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brilliant architecture is exposed to several security threats, e.g., the distributed denial of service (DDoS) attack, which is hard to contain in such software-based networks. The concept of a centralized controller in SDN makes it a single point of attack as well as a single point of failure. In this paper, deep learning-based models, long-short term memory (LSTM) and convolutional neural network (CNN), are investigated. It illustrates their possibility and efficiency in being used in detecting and mitigating DDoS attack. The paper focuses on TCP, UDP, and ICMP flood attacks that target the controller. The performance of the models was evaluated based on the accuracy, recall, and true negative rate. We compared the performance of the deep learning models with classical machine learning models. We further provide details on the time taken to detect and mitigate the attack. Our results show that RNN LSTM is a viable deep learning algorithm that can be applied in the detection and mitigation of DDoS in the SDN controller. Our proposed model produced an accuracy of 89.63%, which outperformed linear-based models such as SVM (86.85%) and Naive Bayes (82.61%). Although KNN, which is a linear-based model, outperformed our proposed model (achieving an accuracy of 99.4%), our proposed model provides a good trade-off between precision and recall, which makes it suitable for DDoS classification. In addition, it was realized that the split ratio of the training and testing datasets can give different results in the performance of a deep learning algorithm used in a specific work. The model achieved the best performance when a split of 70/30 was used in comparison to 80/20 and 60/40 split ratios.


Author(s):  
Xiaolong Xu ◽  
Zijie Fang ◽  
Lianyong Qi ◽  
Xuyun Zhang ◽  
Qiang He ◽  
...  

The Internet of Vehicles (IoV) connects vehicles, roadside units (RSUs) and other intelligent objects, enabling data sharing among them, thereby improving the efficiency of urban traffic and safety. Currently, collections of multimedia content, generated by multimedia surveillance equipment, vehicles, and so on, are transmitted to edge servers for implementation, because edge computing is a formidable paradigm for accommodating multimedia services with low-latency resource provisioning. However, the uneven or discrete distribution of the traffic flow covered by edge servers negatively affects the service performance (e.g., overload and underload) of edge servers in multimedia IoV systems. Therefore, how to accurately schedule and dynamically reserve proper numbers of resources for multimedia services in edge servers is still challenging. To address this challenge, a traffic flow prediction driven resource reservation method, called TripRes, is developed in this article. Specifically, the city map is divided into different regions, and the edge servers in a region are treated as a “big edge server” to simplify the complex distribution of edge servers. Then, future traffic flows are predicted using the deep spatiotemporal residual network (ST-ResNet), and future traffic flows are used to estimate the amount of multimedia services each region needs to offload to the edge servers. With the number of services to be offloaded in each region, their offloading destinations are determined through latency-sensitive transmission path selection. Finally, the performance of TripRes is evaluated using real-world big data with over 100M multimedia surveillance records from RSUs in Nanjing China.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


2013 ◽  
Vol 655-657 ◽  
pp. 2262-2265
Author(s):  
Jian Guo Kong

Air traffic flow management is the key to evaluate airspace capacity reasonably and accurately. Based on the flight features of terminal route intersection, this paper builds a mathematical model for scattered flight of departure aircraft, and then evaluates the terminal capacity based on this model. By combining data from Flight Data Recorder (FDR) and flight schedule with the model, an example-runway 02R of Guangzhou Baiyun airport terminal was given to show the effectiveness of the proposed model.


Author(s):  
М.В. ЗАХАРОВ

Приведен обзор особенностей применения портативныхNIR спектрометров общего назначения, используемых для анализа состава продуктов питания и лекарственных средств. Представлена модель агрегированного потока сетевого трафика от нескольких спектрометров и модель предоставления услуги, обеспечивающая снижение сетевой задержки и объема передаваемых данных. Рассмотрен метод построения сети на основе граничных вычислений для снижения сетевой задержки. Для проверки предложенной модели и метода проведено имитационное моделирование в среде AnyLogic. The Bonch-Bruevich Saint-Petersburg State University of Telecommunications The article provides an overview of the features of the use of portable general-purpose NIR spectrometers to analyze the composition of food or medicines. A model of the aggregated network traffic flow of several spectrometers and a service delivery model, which provides the reduction of network delay and amount of transmitted data, are presented. A method of constructing a network based on edge computing for reduction of network delay is considered. To verify the proposed model and method simulation modeling was carried out in the software environment AnyLogic.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


2015 ◽  
Vol 26 (05) ◽  
pp. 1550054
Author(s):  
Jinliang Cao ◽  
Zhongke Shi ◽  
Jie Zhou

An extended optimal velocity (OV) difference model is proposed in a cooperative driving system by considering multiple OV differences. The stability condition of the proposed model is obtained by applying the linear stability theory. The results show that the increase in number of cars that precede and their OV differences lead to the more stable traffic flow. The Burgers, Korteweg–de Vries (KdV) and modified Korteweg–de Vries (mKdV) equations are derived to describe the density waves in the stable, metastable and unstable regions, respectively. To verify these theoretical results, the numerical simulation is carried out. The theoretical and numerical results show that the stabilization of traffic flow is enhanced by considering multiple OV differences. The traffic jams can be suppressed by taking more information of cars ahead.


Sign in / Sign up

Export Citation Format

Share Document