Affiliation:
1. Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2. Department of Computer Science, Faculty of Computer Science and Information Technology, Al-Baha University, Al-Baha 65799, Saudi Arabia
Abstract
Botnet attacks, such as DDoS, are one of the most common types of attacks in IoT networks. A botnet is a collection of cooperated computing machines or Internet of Things gadgets that criminal users manage remotely. Several strategies have been developed to reduce anomalies in IoT networks, such as DDoS. To increase the accuracy of the anomaly mitigation system and lower the false positive rate (FPR), some schemes use statistical or machine learning methodologies in the anomaly-based intrusion detection system (IDS) to mitigate an attack. Despite the proposed anomaly mitigation techniques, the mitigation of DDoS attacks in IoT networks remains a concern. Because of the similarity between DDoS and normal network flows, leading to problems such as a high FPR, low accuracy, and a low detection rate, the majority of anomaly mitigation methods fail. Furthermore, the limited resources in IoT devices make it difficult to implement anomaly mitigation techniques. In this paper, an efficient anomaly mitigation system has been developed for the IoT network through the design and implementation of a DDoS attack detection system that uses a statistical method that combines three algorithms: exponentially weighted moving average (EWMA), K-nearest neighbors (KNN), and the cumulative sum algorithm (CUSUM). The integration of fog computing with the Internet of Things has created an effective framework for implementing an anomaly mitigation strategy to address security issues such as botnet threats. The proposed module was evaluated using the Bot-IoT dataset. From the results, we conclude that our model has achieved a high accuracy (99.00%) with a low false positive rate (FPR). We have also achieved good results in distinguishing between IoT and non-IoT devices, which will help networking teams make the distinction as well.
Funder
King Abdulaziz University
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Reference34 articles.
1. All one needs to know about fog computing and related edge computing paradigms: A complete survey;Ashkan;J. Syst. Archit.,2019
2. Palle, S.R.G. (2018). Fog Computing Based IoT Applications and Their Performance. [Ph.D. Thesis, University of Missouri-Kansas City].
3. A fog computing based approach to dDoS mitigation in iIoT systems;Zhou;Comput. Secur.,2019
4. Paharia, B., and Bhushan, K. (2018, January 10–12). Fog Computing as a Defensive Approach Against Distributed Denial of Service (dDoS): A Proposed Architecture. Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India.
5. Alzahrani, R.J., and Alzahrani, A. (2021). Security Analysis of dDoS Attacks Using Machine Learning Algorithms in Networks Traffic. Electronics, 10.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献