Deep Learning-Based Echo State Neural Network for Cyber Threat Detection in IoT-Driven IICS Networks
DOI:
https://doi.org/10.47839/ijc.23.2.3538Keywords:
Software-Defined Networking, Distributed Denial of Service, EtherCAT, Netlink, SoftRouter, Inter Planetary File System, Mobile Edge Computing, NSLKDD datasetAbstract
The advent of Software-Defined Networking (SDN) has ushered in a new era in network architecture, providing unprecedented levels of flexibility and adaptability. However, this advanced flexibility exposes SDN to security risks, particularly Distributed Denial of Service (DDoS) attacks. Detecting and mitigating DDoS attacks in SDN environments poses a critical challenge. This study introduces an innovative DDoS detection approach leveraging Echo State Networks (ESN) tailored specifically for SDN. This approach is based on two core assumptions: firstly, routine network operations primarily exhibit normal behavior, and secondly, there are discernible differences in data characteristics between normal and abnormal network conditions. These assumptions hold true in the realm of everyday network dynamics. To validate the efficacy of the ESN algorithm, we augment this approach by incorporating flow features to enhance DDoS detection capabilities. This study underscores the effectiveness of ESN in identifying and mitigating Distributed Denial of Service (DDoS) attacks, DDoS threats, achieving an impressive average success rate of 97.78%. By harnessing the potential of Echo State Networks, this work makes a substantial contribution to ongoing efforts in fortifying network security, providing a proactive defense against disruptive DDoS attacks.
References
Y. Njah and M. Cheriet, “Parallel route optimization and service assurance in energy-efficient software-defined industrial IoT networks,” IEEE Access, vol. 9, pp. 24682-24696, 2021, https://doi.org/10.1109/ACCESS.2021.3056931.
Z. Li et al., “Fault localization based on knowledge graph in software-defined optical networks,” Journal of Lightwave Technology, vol. 39, no. 13, pp. 4236-4246, https://doi.org/10.1109/JLT.2021.3071868.
A. O. Nyanteh, M. Li, M. F. Abbod and H. Al-Raweshidy, “CloudSimHypervisor: Modeling and simulating network slicing in software-defined cloud networks,” IEEE Access, vol. 9, pp. 72484-72498, 2021, https://doi.org/10.1109/ACCESS.2021.3079501.
S. Nam, H. Kim and S.-G. Min, “Simplified stream reservation protocol over software-defined networks for in-vehicle time-sensitive networking,” IEEE Access, vol. 9, pp. 84700-84711, 2021, https://doi.org/10.1109/ACCESS.2021.3088288.
J. Montalvo, J. Torrijos, D. Cortes, R. Chundury and M. St. Peter, “Journey toward software-defined passive optical networks with multi-PON technology: an industry view [Invited],” Journal of Optical Communications and Networking, vol. 13, no. 8, pp. D22-D31, 2021, https://doi.org/10.1364/JOCN.423034.
I. Aliyu, M. C. Feliciano, S. Van Engelenburg, D. O. Kim and C. G. Lim, “A blockchain-based federated forest for SDN-enabled in-vehicle network intrusion detection system,” IEEE Access, vol. 9, pp. 102593-102608, 2021, https://doi.org/10.1109/ACCESS.2021.3094365.
R. Amin, E. Rojas, A. Aqdus, S. Ramzan, D. Casillas-Perez and J. M. Arco, “A survey on machine learning techniques for routing optimization in SDN,” IEEE Access, vol. 9, pp. 104582-104611, 2021, https://doi.org/10.1109/ACCESS.2021.3099092.
J. Okwuibe et al., “SDN-enabled resource orchestration for industrial iot in collaborative edge-cloud networks,” IEEE Access, vol. 9, pp. 115839-115854, 2021, https://doi.org/10.1109/ACCESS.2021.3105944.
A. O. Sangodoyin, M. O. Akinsolu, P. Pillai and V. Grout, “Detection and classification of DDoS flooding attacks on software-defined networks: A case study for the application of machine learning,” IEEE Access, vol. 9, pp. 122495-122508, 2021, https://doi.org/10.1109/ACCESS.2021.3109490.
F. Orozco-Santos, V. Sempere-Payá, J. Silvestre-Blanes and T. Albero-Albero, “Multicast scheduling in SDN WISE to support mobile nodes in industrial wireless sensor networks,” IEEE Access, vol. 9, pp. 141651-141666, 2021, https://doi.org/10.1109/ACCESS.2021.3120917.
Z. Li, X. Yang, C. Wang, K. Ma and C. Jiang, “Crowd-learning: A behavior-based verification method in software-defined vehicular networks with MEC framework,” IEEE Internet of Things Journal, vol. 9, no. 2, pp. 1622-1639, 2022, https://doi.org/10.1109/JIOT.2021.3107581.
J. L. Herrera, J. Galán-Jiménez, L. Foschini, P. Bellavista, J. Berrocal and J. M. Murillo, “QoS-aware fog node placement for intensive IoT applications in SDN-fog scenarios,” IEEE Internet of Things Journal, vol. 9, no. 15, pp. 13725-13739, 2022, https://doi.org/10.1109/JIOT.2022.3143948.
A. B. Haque, B. Bhushan, & G. Dhiman, “Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends,” Expert Systems, vol. 39, issue 5, e12753, 2022. https://doi.org/10.1111/exsy.12753.
J. Mirkovic, & P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, issue 2, pp. 39-53, 2004. https://doi.org/10.1145/997150.997156.
C. Douligeris, & A. Mitrokotsa, “DDoS attacks and defense mechanisms: Classification and state-of-the-art,” Computer Networks, vol. 44, issue 5, pp. 643-666, 2004. https://doi.org/10.1016/j.comnet.2003.10.003.
M. T. Manavi, “Defense mechanisms against distributed denial of service attacks: A survey,” Computers & Electrical Engineering, vol. 72, pp. 26-38, 2018. https://doi.org/10.1016/j.compeleceng.2018.09.001.
X. Zhang, Y. Zhang, R. Altaf, X. Feng, “A multi-agent system-based method of detecting DDoS attacks,” I. J. Computer Network and Information Security, vol. 2, pp. 52-64, 2018. https://doi.org/10.5815/ijcnis.2018.02.07.
N. A. Ignatev, & E. R. Navruzov, “Estimates of the complexity of detecting types of DDOS attacks,” International Journal of Computing, vol. 21, issue 4, pp. 443-449, 2022. https://doi.org/10.47839/ijc.21.4.2779.
J. Nazario, “DDoS attack evolution,” Network Security, vol. 2008, issue 7, pp. 7-10, 2008. https://doi.org/10.1016/S1353-4858(08)70086-2.
Q. Yan, F. R. Yu, Q. Gong, & J. Li, “Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges,” IEEE Communications Surveys & Tutorials, vol. 18, issue 1, pp. 602-622, 2015. https://doi.org/10.1109/COMST.2015.2487361.
G. A. Jaafar, S. M. Abdullah, & S. Ismail, “Review of recent detection methods for HTTP DDoS attack,” Journal of Computer Networks and Communications, vol. 2019, article ID 1283472, pp. 1-10, 2019. https://doi.org/10.1155/2019/1283472.
K. Sonar, & H. Upadhyay, “A survey: DDOS attack on Internet of Things,” International Journal of Engineering Research and Development, vol. 10, issue 11, pp. 58-63, 2024.
J. Mirkovic, M. Robinson, & P. Reiher, “Alliance formation for DDoS defense,” Proceedings of the 2003 Workshop on New Security Paradigms, 2003, pp. 11-18. https://doi.org/10.1145/986655.986658.
Y. Li, Q. Liu, “A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments,” Energy Reports, vol. 7, pp. 8176-8186, 2021. https://doi.org/10.1016/j.egyr.2021.08.126.
S. Yu, J. Zhang, J. Liu, X. Zhang, Y. Li, & T. Xu, “A cooperative DDoS attack detection scheme based on entropy and ensemble learning in SDN,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, article ID 90, 2021. https://doi.org/10.1186/s13638-021-01957-9.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.