Leveraging Machine Learning and SDN-Fog Infrastructure to Mitigate Flood Attacks

Harsh Sharma, Shashank Gupta
{"title":"Leveraging Machine Learning and SDN-Fog Infrastructure to Mitigate Flood Attacks","authors":"Harsh Sharma, Shashank Gupta","doi":"10.1109/GCWkshps52748.2021.9681984","DOIUrl":null,"url":null,"abstract":"The use of IoT devices is growing rapidly and it is playing a critical role in a diverse set of industries. It has been instrumental in the growth of smart cities. Smart cities have emerged as a paradigm for urban development which aims to be sustainable, efficient and improve accessibility. However, the limited processing power of IoT devices makes them susceptible to flood-based attacks. Denial of Service attacks can overwhelm the computing resources or network bandwidth of IoT networks. Since IoT devices power critical infrastructure like traffic management in smart cities, adequate defense of such networks from malicious actors is imperative. In this article, the authors propose a framework tailored for detection and mitigation of flood-based attacks in smart city infrastructure. The proposed smart city framework aims to reduce latency of attack detection by using fog computing for feature extraction and security maintenance. It allows scalability by utilizing SDN and fog infrastructure for mitigation of attacks. We have analysed and utilized packet-level features which are excellent for distinguishing between IoT and attack traffic. We have trained and quantitatively compared 5 state-of-the-art supervised machine learning models for attack detection in this paper. We were able to achieve an accuracy of 99.9% on our simulated dataset in attack detection.","PeriodicalId":6802,"journal":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Globecom Workshops (GC Wkshps)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCWkshps52748.2021.9681984","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The use of IoT devices is growing rapidly and it is playing a critical role in a diverse set of industries. It has been instrumental in the growth of smart cities. Smart cities have emerged as a paradigm for urban development which aims to be sustainable, efficient and improve accessibility. However, the limited processing power of IoT devices makes them susceptible to flood-based attacks. Denial of Service attacks can overwhelm the computing resources or network bandwidth of IoT networks. Since IoT devices power critical infrastructure like traffic management in smart cities, adequate defense of such networks from malicious actors is imperative. In this article, the authors propose a framework tailored for detection and mitigation of flood-based attacks in smart city infrastructure. The proposed smart city framework aims to reduce latency of attack detection by using fog computing for feature extraction and security maintenance. It allows scalability by utilizing SDN and fog infrastructure for mitigation of attacks. We have analysed and utilized packet-level features which are excellent for distinguishing between IoT and attack traffic. We have trained and quantitatively compared 5 state-of-the-art supervised machine learning models for attack detection in this paper. We were able to achieve an accuracy of 99.9% on our simulated dataset in attack detection.
利用机器学习和SDN-Fog基础设施减轻洪水攻击
物联网设备的使用正在迅速增长,它在各种行业中发挥着关键作用。它在智慧城市的发展中发挥了重要作用。智慧城市已成为城市发展的典范,其目标是可持续、高效和改善可达性。然而,物联网设备有限的处理能力使它们容易受到基于洪水的攻击。拒绝服务攻击会使物联网网络的计算资源或网络带宽不堪重负。由于物联网设备为智能城市中的交通管理等关键基础设施提供动力,因此必须充分防御此类网络免受恶意行为者的攻击。在本文中,作者提出了一个专门针对智慧城市基础设施中基于洪水的攻击进行检测和缓解的框架。提出的智慧城市框架旨在通过使用雾计算进行特征提取和安全维护来减少攻击检测的延迟。它通过利用SDN和雾基础设施来减轻攻击,从而实现可伸缩性。我们分析并利用了包级功能,这些功能非常适合区分物联网和攻击流量。在本文中,我们训练并定量比较了5种用于攻击检测的最先进的监督机器学习模型。我们能够在模拟数据集上实现99.9%的攻击检测准确率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信