物联网数据融合系统分布式拒绝服务攻击防范机制设计

Siddhant Thapliyal, Mohammad Wazid, D.P. Singh
{"title":"物联网数据融合系统分布式拒绝服务攻击防范机制设计","authors":"Siddhant Thapliyal,&nbsp;Mohammad Wazid,&nbsp;D.P. Singh","doi":"10.1016/j.csa.2025.100092","DOIUrl":null,"url":null,"abstract":"<div><div>In the current era, informatics systems technology is advancing at a rapid pace, and as a result, the Internet of Things (IoT) has become increasingly important to daily life in many ways. Multisensor fusion is the integration of data from several sensors/ sensing devices (i.e., smart IoT devices) to produce a more accurate and reliable representation of the environment. It is a crucial technology across numerous fields, including robotics, autonomous vehicles, smart cities, and other IoT-driven applications. The availability of several devices that serve as IoT enablers, such as smartwatches, smartphones, security cameras, and smart sensors, has led to an increase in the popularity of IoT applications compared to earlier times. In order to create a bidirectional distributed denial-of-service (DDoS) detection mechanism for an IoT-driven data fusion system, this study proposed a scheme by making use of three deep/ machine learning algorithms, K-Nearest neighbor (KNN), Gaussian Mixture Model (GMM), and Support Vector Machine (SVM). In order to identify the most efficient model against DDoS attacks that can precisely detect and discriminate DDoS from legal traffic, the KNN, GMM, SVM are tested and put into practice using SVM model for highest accuracy. An SDN-specific data set created with Mini Net emulator involves designing a network topology, generating traffic, and collecting data to evaluate SDN applications and controllers. Confusion Matrix is used to test and evaluate the three models in relation to four widely-used criteria: accuracy, precision, recall, and F-measure. Network simulation is used to analyze malicious traffic, which consists of a combination of ICMP, UDP Flood, and TCP Syn attack, as well as benign TCP, UDP, and ICMP traffic.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100092"},"PeriodicalIF":0.0000,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion system\",\"authors\":\"Siddhant Thapliyal,&nbsp;Mohammad Wazid,&nbsp;D.P. Singh\",\"doi\":\"10.1016/j.csa.2025.100092\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In the current era, informatics systems technology is advancing at a rapid pace, and as a result, the Internet of Things (IoT) has become increasingly important to daily life in many ways. Multisensor fusion is the integration of data from several sensors/ sensing devices (i.e., smart IoT devices) to produce a more accurate and reliable representation of the environment. It is a crucial technology across numerous fields, including robotics, autonomous vehicles, smart cities, and other IoT-driven applications. The availability of several devices that serve as IoT enablers, such as smartwatches, smartphones, security cameras, and smart sensors, has led to an increase in the popularity of IoT applications compared to earlier times. In order to create a bidirectional distributed denial-of-service (DDoS) detection mechanism for an IoT-driven data fusion system, this study proposed a scheme by making use of three deep/ machine learning algorithms, K-Nearest neighbor (KNN), Gaussian Mixture Model (GMM), and Support Vector Machine (SVM). In order to identify the most efficient model against DDoS attacks that can precisely detect and discriminate DDoS from legal traffic, the KNN, GMM, SVM are tested and put into practice using SVM model for highest accuracy. An SDN-specific data set created with Mini Net emulator involves designing a network topology, generating traffic, and collecting data to evaluate SDN applications and controllers. Confusion Matrix is used to test and evaluate the three models in relation to four widely-used criteria: accuracy, precision, recall, and F-measure. Network simulation is used to analyze malicious traffic, which consists of a combination of ICMP, UDP Flood, and TCP Syn attack, as well as benign TCP, UDP, and ICMP traffic.</div></div>\",\"PeriodicalId\":100351,\"journal\":{\"name\":\"Cyber Security and Applications\",\"volume\":\"3 \",\"pages\":\"Article 100092\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2025-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cyber Security and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2772918425000098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security and Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2772918425000098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今时代,信息系统技术飞速发展,物联网(IoT)在许多方面对人们的日常生活变得越来越重要。多传感器融合是来自多个传感器/传感设备(即智能物联网设备)的数据集成,以产生更准确和可靠的环境表示。它是许多领域的关键技术,包括机器人、自动驾驶汽车、智能城市和其他物联网驱动的应用。作为物联网推动者的几种设备的可用性,如智能手表、智能手机、安全摄像头和智能传感器,导致物联网应用的普及程度与早期相比有所增加。为了在物联网驱动的数据融合系统中建立双向分布式拒绝服务(DDoS)检测机制,本研究提出了一种利用k -最近邻(KNN)、高斯混合模型(GMM)和支持向量机(SVM)三种深度/机器学习算法的方案。为了找到最有效的抵御DDoS攻击的模型,能够准确地检测和区分DDoS和合法流量,使用SVM模型对KNN、GMM、SVM进行了测试和实践,以获得最高的精度。使用Mini Net模拟器创建的SDN特定数据集涉及设计网络拓扑、生成流量和收集数据以评估SDN应用程序和控制器。混淆矩阵用于测试和评估与四个广泛使用的标准相关的三个模型:准确性,精度,召回率和F-measure。网络仿真主要用于分析ICMP、UDP Flood和TCP Syn攻击的组合恶意流量,以及TCP、UDP和ICMP的良性流量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion system
In the current era, informatics systems technology is advancing at a rapid pace, and as a result, the Internet of Things (IoT) has become increasingly important to daily life in many ways. Multisensor fusion is the integration of data from several sensors/ sensing devices (i.e., smart IoT devices) to produce a more accurate and reliable representation of the environment. It is a crucial technology across numerous fields, including robotics, autonomous vehicles, smart cities, and other IoT-driven applications. The availability of several devices that serve as IoT enablers, such as smartwatches, smartphones, security cameras, and smart sensors, has led to an increase in the popularity of IoT applications compared to earlier times. In order to create a bidirectional distributed denial-of-service (DDoS) detection mechanism for an IoT-driven data fusion system, this study proposed a scheme by making use of three deep/ machine learning algorithms, K-Nearest neighbor (KNN), Gaussian Mixture Model (GMM), and Support Vector Machine (SVM). In order to identify the most efficient model against DDoS attacks that can precisely detect and discriminate DDoS from legal traffic, the KNN, GMM, SVM are tested and put into practice using SVM model for highest accuracy. An SDN-specific data set created with Mini Net emulator involves designing a network topology, generating traffic, and collecting data to evaluate SDN applications and controllers. Confusion Matrix is used to test and evaluate the three models in relation to four widely-used criteria: accuracy, precision, recall, and F-measure. Network simulation is used to analyze malicious traffic, which consists of a combination of ICMP, UDP Flood, and TCP Syn attack, as well as benign TCP, UDP, and ICMP traffic.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.20
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信