Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.07.101

Machine Learning-based Detection of DoS and DRDoS Attacks in IoT Networks  

Yeo, Seung-Yeon (Dept. of Information Security, Seoul Women's University)
Jo, So-Young (Dept. of Information Security, Seoul Women's University)
Kim, Jiyeon (Dept. of Computer Engineering, Daegu University)
Abstract
We propose an intrusion detection model that detects denial-of-service(DoS) and distributed reflection denial-of-service(DRDoS) attacks, based on the empirical data of each internet of things(IoT) device by training system and network metrics that can be commonly collected from various IoT devices. First, we collect 37 system and network metrics from each IoT device considering IoT attack scenarios; further, we train them using six types of machine learning models to identify the most effective machine learning models as well as important metrics in detecting and distinguishing IoT attacks. Our experimental results show that the Random Forest model has the best performance with accuracy of over 96%, followed by the K-Nearest Neighbor model and Decision Tree model. Of the 37 metrics, we identified five types of CPU, memory, and network metrics that best imply the characteristics of the attacks in all the experimental scenarios. Furthermore, we found out that packets with higher transmission speeds than larger size packets represent the characteristics of DoS and DRDoS attacks more clearly in IoT networks.
Keywords
Internet of Things; Intrusion Detection; Machine Learning; Denial of Service; Distributed Reflection Denial of Service;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Sebastian Garcia, Agustin Parmisano, and Maria Jose Erquiaga, IoT-23: A labeled dataset with malicious and benign IoT network traffic, https://www.stratosphereips.org/blog/2020/1/22/aposematiot-23-a-labeled-dataset-with-malicious-and-benign-iot-network-traffic
2 Damasevicius Robertas, Venckauskas Algimantas, Grigaliunas Sarunas, Toldinas Jevgenijus, Morkevicius Nerijus, Aleliunas Tautvydas, and Smuikys Paulius," LITNET-2020: An Annotated Real-World Network Flow Dataset for Network Intrusion Detection," Electronics, Vol. 9, No. 5, 2020. DOI: 10.3390/electronics9050800   DOI
3 Ullah Imtiaz, and Mahmoud Qusay. "A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks," Advances in Artificial Intelligence, pp. 508-520, May 2020. DOI: 10.1007/978-3-030-47358-7_52   DOI
4 Islam Nahida, Farhin Fahiba, Sultana Ishrat, Kaiser M. Shamim, Rahman Md, Hosen A. S. M., Cho Gi, and Hwan Gi, "Towards Machine Learning Based Intrusion Detection in IoT Networks," Computers, Materials and Continua, Vol. 69, NO. 2, pp. 1801-1821, Aug 2021. DOI:10.32604/cmc.2021.018466   DOI
5 Raneem Qaddoura, Ala'M. Al-Zoubi, Hossam Faris, and Iman Almomani, "A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning", Sensors, Vol. 21, NO. 9, Apr 2021. DOI: 10.3390/s21092987   DOI
6 Hasan Alkahtani, and Theyazn H. H. Aldhyani, "Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms", Complexity, Vol. 2021, NO. 3, Jul 2021. DOI: 10.1155/2021/5579851   DOI
7 Knud Lasse Lueth, "State of the IoT 2020: 12 billion IoT connections, surpassing non-IoT for the first time", https://iot-analytics.com/state-of-the-iot-2020-12-billion-iot-connections-surpassing-non-iotfor-the-first-time
8 Booij Tim, Chiscop Irina, Meeuwissen Erik, Moustafa Nour, and den Hartog Frank, "ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Datasets," IEEE Internet of Things Journal, Vol. 9, NO. 1, pp. 485-496, Jan 2022. DOI: 10.1109/JIOT.2021.3085194   DOI
9 Shahin Rawan, and Sabri Khair Eddin, "A Secure IoT Framework Based on Blockchain and Machine Learning," International Journal of Computing and Digital Systems, Vol. 11, NO. 1, pp. 671-683, Jan 2022. DOI: 10.12785/ijcds/110154   DOI
10 Nicolas-Alin Stoian, "Machine Learning for Anomaly Detection in IoT networks: Malware analysis on the IoT-23 Data set," Jul 2020.
11 Shafiq Muhammad, Tian Zhihong, Sun Yanbin, Du Xiaojiang, and Guizani Mohsen, "Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city," Future Generation Computer Systems, Vol. 107, NO. 4, Jun 2020. DOI: 10.1016/j.future.2020.02.017   DOI
12 Das Anurag, Ajila Samuel, and Lung Chung-Horng, "A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection," Machine Learning for Networking, pp. 40-57, Apr 2020. DOI: 10.1007/978-3-030-45778-5_4   DOI
13 NSL-KDD dataset, https://www.unb.ca/cic/datasets/nsl.html
14 Hasan Mahmudul, Islam Md, Islam Ishrak, and Hashem M.M.A., "Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches," Internet of Things, Sep 2019. DOI: 10.1016/j.iot.2019.100059   DOI
15 FrancoisXA, DS2OS traffic traces, https://www.kaggle.com/francoisxa/ds2ostraffictraces
16 Strecker Sam, Dave Rushit, Siddiqui Nyle, and Seliya Naeem, "A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods," Journal of Computer Sciences and Applications, Vol. 9, NO. 1, pp. 16-22, Oct 2021. DOI: 10.12691/jcsa-9-1-2   DOI
17 Patel Keyur, Patel Sunil Scholar P, and Salazar Carlos, "Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges," IJESC, Vol. 6, NO. 5, May 2016. DOI: 10.4010/2016.1482   DOI
18 Paloaltonetworks,"2020 Unit 42 IoT Threat Report", https://unit42.paloaltonetworks.com/iot-threat-report-2020, 2020.03.10.
19 IoTnews, "Kaspersky: Attacks on IoT devices double in a year", https://www.iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year, 2021.09.07
20 KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
21 Koroniotis Nickolaos, Moustafa Nour, Sitnikova Elena, and Turnbull Benjamin, "Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset," Future Generation Computer Systems, Volume 100, pp. 779-796, Nov. 2019.   DOI
22 Reddy Dukka, Behera Dr. H., Nayak Janmenjoy, Vijayakumar P, Naik Bighnaraj, and Singh Pradeep, "Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities," Transactions on Emerging Telecommunications Technologies, Vol. 32, NO. 6, Oct 2020. DOI: 10.1002/ett.4121   DOI
23 Satish Pokhrel, Robert Abbas, and Bhulok Aryal "IoT Security: Botnet detection in IoT using Machine learning," arXiv:2104.02231, Arp 2021. DOI: 10.48550/arXiv.2104.02231   DOI
24 Churcher Andrew, Ullah Rehmat, Ahmad Jawad, Rehman Sadaqat Ur, Masood Fawad, Gogate Mandar, Alqahtani Fehaid, Nour Boubakr, and Buchanan William, "An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks," Sensors, Vol. 21, NO. 2, pp. 1-32, Jan 2021. DOI: 10.3390/s21020446   DOI