{"title":"基于无监督算法的物联网DDoS攻击检测","authors":"Hailye Tekleselase","doi":"10.5121/ijfls.2021.11401","DOIUrl":null,"url":null,"abstract":"The increase in the deployment of IoT networks has improved productivity of humans and organisations. However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS attack in IoT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDoS attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.","PeriodicalId":44705,"journal":{"name":"International Journal of Fuzzy Logic and Intelligent Systems","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2021-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DDoS Attack Detection on Internet o Things using Unsupervised Algorithms\",\"authors\":\"Hailye Tekleselase\",\"doi\":\"10.5121/ijfls.2021.11401\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increase in the deployment of IoT networks has improved productivity of humans and organisations. However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS attack in IoT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDoS attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.\",\"PeriodicalId\":44705,\"journal\":{\"name\":\"International Journal of Fuzzy Logic and Intelligent Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2021-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Fuzzy Logic and Intelligent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/ijfls.2021.11401\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Fuzzy Logic and Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/ijfls.2021.11401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
DDoS Attack Detection on Internet o Things using Unsupervised Algorithms
The increase in the deployment of IoT networks has improved productivity of humans and organisations. However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS attack in IoT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDoS attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.
期刊介绍:
The International Journal of Fuzzy Logic and Intelligent Systems (pISSN 1598-2645, eISSN 2093-744X) is published quarterly by the Korean Institute of Intelligent Systems. The official title of the journal is International Journal of Fuzzy Logic and Intelligent Systems and the abbreviated title is Int. J. Fuzzy Log. Intell. Syst. Some, or all, of the articles in the journal are indexed in SCOPUS, Korea Citation Index (KCI), DOI/CrossrRef, DBLP, and Google Scholar. The journal was launched in 2001 and dedicated to the dissemination of well-defined theoretical and empirical studies results that have a potential impact on the realization of intelligent systems based on fuzzy logic and intelligent systems theory. Specific topics include, but are not limited to: a) computational intelligence techniques including fuzzy logic systems, neural networks and evolutionary computation; b) intelligent control, instrumentation and robotics; c) adaptive signal and multimedia processing; d) intelligent information processing including pattern recognition and information processing; e) machine learning and smart systems including data mining and intelligent service practices; f) fuzzy theory and its applications.