An Efficient IDS Using FIS To Detect DDoS in IoT Networks - Slide - Nics
An Efficient IDS Using FIS To Detect DDoS in IoT Networks - Slide - Nics
NICS 2022
31 Oct - 1 Nov 2022
Outline
• Introduction
• Our main works
• Conclusion and our future work
• Discussions
Introduction
Motivation
• The growing IoT applications of today have brought numerous benefits to our lives. In
addition, cyber-attacks are growing as a result of increasingly sophisticated and
violent attacks.
• Many additional challenges continue to emerge as demand for IDS deployment at the
edge network, where resource-constrained devices exist, continues to increase.
Our approach
• Developing Fuzzy Inference System with the help of PSO algorithm to detect DDoS
attacks on IoT 23 dataset
Our contribution
• Propose a novel IDS system based on a fuzzy inference system (FIS model) to detect
DDOS attacks on little IoT 23 with high accuracy so that edge computing can be
deployed
Our main Work
Related work
• Various studies are focusing on the schemes in which FIS is used to build abnormal
detection systems [18-24].
• Some reliable and effective fuzzy-based IDS proposals for IoT networks against
DDoS attacks have been published [1] [2] [19] [20] [25].
• Solutions to detect DDOS at the edge of the network brings great benefits to
network operators with the classification and dimensionality reduction for the data
set is a core condition [27][28][29].
• Researchers have focused their attention on the frameworks for IDS in IoT
networks evaluated by the IoT23 dataset [30-34]
Our main Work
Background
• Fuzzy Inference System
• Fuzzy Logic Theory is a kind of soft computing approach to solve real-world problems with solutions
that are close to natural human decisions.
• A Fuzzy Inference System (FIS) is a system that uses a fuzzy set theory to map input variables to an
output space.
Background
• Particle Swarm Optimization (PSO)
• PSO is a meta-heuristic population-based optimization algorithm under the category of
evolutionary algorithm.
• The particles move iteratively around the search space to find the global best location (the best
solution).
• In each iteration, a particle updates its velocity and location according to two formulas:
(1)
(2)
Data processing
• Network features are extracted from the conn.log.labeled file in the little IoT-23 dataset
and exported to the file in CSV format.
• Local network features will be removed from the dataset; Index features of the dataset
are coded and presented as binary data; NaN values are substituted for 0.
• The featured columns are then normalized to a specified range [-1 1] to eliminate large
values and speed up computation.
• The appropriate features are selected through the recursive feature elimination
technique.
• The principal components analysis (PCA) technique is applied to the data.
Our main Work
Data processing
• We select the dataset's secure (Benign) and DDoS patterns. This dataset is divided into 3
sets: Training_set, Validating_set, and Testing_set.
• The training_set is a standard space for the following stages' calculations.
L L FA 0.8
Degree of membership
0.6
L H HA
0.4
H L FA 0.2
H H MA 0
(3)
(4)
(5)
(6)
Fig. 5. The input membership function
Our main Work
Parameter Value
population 50
c1 = 2
constriction factor
c2 = 2
inertia factor 1
inertia factor
0.99
reduction rate
Number of rounds 50
0.8 0.8
Degree of membership
Degree of membership
0.6 0.6
0.4 0.4
0.2 0.2
0
0
Conclusion
• This paper presents an IDS model for detecting DDOS attacks that can be
deployed on edge devices.
• Using PSO-optimized FIS, our proposed model produced amazing results
compared to previously proposed methods. The detection accuracy of DDOS
attacks is up to 99.9%, with IoT23 database sample sizes fully deployable on edge
devices.
Future Work
• Deploying the proposed model on practical IoT devices.
Discussion
• [1] Faisal Hussain, Syed Ghazanfar Abbas, etc. "IoT DoS and DDoS Attack Detection using ResNet" 2020 IEEE 23rd International Multitopic Conference (INMIC), pp. 1-6, 2020.
• [2] Mohammed Hasan Ali, etc. "Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT),“ Electronics 2022.
• [3] L. Xiaoming, V. Sejdini, and H. Chowdhury, "Denial of service (dos) attack with udp flood," School of Computer Science, University of Windsor, Canada, 2010.
• [4] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: Mirai and Other Botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017.
• [5] Tarak Nandy, Mohd Yamani Idna Idris, Rafidah Md. Noor and Sananda Bhattacharyya, "Review on Security of Internet of Things Authentication Mechanism," IEEE Access, vol. 7, pp.
151054-151089, oct 2019.
• [6] Yinhao Xiao, Yizhen Jia, etc. "Edge Computing Security: State-of- The-Art and Challenges," Proceedings of the IEEE, vol. 107, no. 8, pp.1608-1631, 2019.
• [7] R. Shanmugavadivu and N. Nagarajan, "Network intrusion detection system using fuzzy logic," Indian Journal of Computer Science and Engineering (IJCSE), vol. 2, no. 1, pp. 101–111,
2011.
• [8] M. Almseidin, M. Al-kasassbeh, and S. Kovacs, "Fuzzy rule interpolation and snmp-mib for emerging network abnormality,“ International Journal on Advanced Science, Engineering
and Information Technology, vol. 9, no. 3, pp. 735–744, 2019.
• [9] M. Al-Kasassbeh, M. Almseidin, K. Alrfou, and S. Kovacs, "Detection of iot-botnet attacks using fuzzy rule interpolation," Journal of Intelligent & Fuzzy Systems, Vol 39, pp. 421–431,
2020.
• [10] M. Almseidin and S. Kovacs, "Intrusion detection mechanism using fuzzy rule interpolation," Journal of Theoretical and Applied Information Technology, vol. 96, no. 16, pp. 5473–
5488, 2018.
• [11] B. A. Khalaf, S. A. Mostafa, A. Mustapha, M. A. Mohammed, and W. M. Abduallah, "Comprehensive review of artificial intelligence and statistical approaches in distributed denial of
service attack and defense methods," IEEE Access, vol. 7, pp. 51 691–51 713, 2019.
• [12] S. Ghazanfar, F. Hussain, A. U. Rehman, U. U. Fayyaz, F. Shahzad, and G. A. Shah, "Iot-flock: An open-source framework for iot traffic generation," in 2020 International Conference
on Emerging Trends in Smart Technologies (ICETST). IEEE, 2020, pp. 1–6.
• [13] I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, "Developing realistic distributed denial of service (ddos) attack dataset and taxonomy," in 2019 International Carnahan
Conference on Security Technology (ICCST). IEEE, 2019, pp. 1–8.
References
• [14] M. Almseidin, J. Al-Sawwa, and M. Alkasassbeh, "Anomaly-based Intrusion Detection System Using Fuzzy Logic," in 2021 International Conference on Information Technology
(ICIT), 2021, pp. 290-295
• [15] J. Rabatel, S. Bringay, and P. Poncelet, "Fuzzy anomaly detection in monitoring sensor data," in Fuzzy Systems (FUZZ), 2010 IEEE International Conference on Fuzzy Systems, 2010,
pp. 1-8.
• [16] M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, "A survey of network-based intrusion detection data sets," Computers & Security, vol. 86, pp. 147-167, 2019.
• [17] G. F. Scaranti, L. F. Carvalho, S. Barbon, and M. L. Proença, "Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-defined networks," IEEE Access,
vol. 8, pp. 100172-100184 2020.
• [18] M. E. Aminanto, H. Kim, K.-M. Kim, and K. Kim, "Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm,“ IEICE Transactions on Fundamentals of
Electronics, Communications and Computer Sciences, vol. E100.A, pp. 176-183, 2017.
• [19] H. A. P. and K. K., "Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things,“ EURASIP Journal on Wireless
Communications and Networking, vol. 2019, pp. 1-15, April 05 2019.
• [20] M. P. Novaes, L. F. Carvalho, J. Lloret, and M. L. Proença, "Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network
Environment," IEEE Access, vol. 8, pp. 83765-83781, 2020.
• [21] M. V. De Assis, A. H. Hamamoto, T. Abrão, and M. L. Proença, "A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation
on SDN networks," IEEE Access, vol. 5, pp. 9485-9496, 2017.
• [22] M. Usman, V. Muthukkumarasamy, and X.-W. Wu, "Mobile agentbased cross-layer anomaly detection in smart home sensor networks using fuzzy logic," IEEE Transactions on
Consumer Electronics, vol. 61, pp. 197-205, 2015.
• [23] H. S. Mondal, M. T. Hasan, M. B. Hossain, M. E. Rahaman, and R. Hasan, "Enhancing secure cloud computing environment by Detecting DDoS attack using fuzzy logic," in 2017 3rd
International Conference on Electrical Information and Communication Technology (EICT), 2017, pp. 1-4.
• [24] Hajar Moudoud; Lyes Khoukhi; Soumaya Cherkaoui, "Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT," IEEE Network, Volume: 35, Issue: 2, March/April
2021.
• [25] Trong-Minh Hoang, "A Study on Anomaly Data Traffic Detection Method for Wireless Sensor Networks," Intelligent Systems and Networks (pp.429-436), 2021.
References
• [26] Sharma, DK, Dhankhar, T, Agrawal, G, Singh, SK, Gupta, D, Nebhen, J and Razzak, Muhammad Imran, "Anomaly detection framework to prevent DDoS attack in fog empowered IoT
networks, Ad Hoc Networks", vol. 121, pp. 1-9, doi: 10.1016/j.adhoc.2021.102603.
• [27] L Zhou, H Guo, G Deng," A fog computing based approach to DDoS mitigation in IIoT systems," Computers & Security, vol. 85, pp. 51-62,2019.
• [28] S Myneni, A Chowdhary, D Huang, A Alshamrani, "SmartDefense: A distributed deep defense against DDoS attacks with edge computing, "Computer Networks, vol. 209 2022.
• [29] Lefoane, Moemedi; Ghafir, Ibrahim; Kabir, Sohag; Awan, Irfan U. "Machine Learning for Botnet Detection: An Optimized Feature Selection Approach," ICFNDS 2021.
• [30] Wan Nur Fatihah Wan Mohd Zaki, Raihana Syahirah Abdullah Warusia Yassin, Faizal M.A, Muhammad Safwan Rosli, "Constructing IoT Botnets Attack Pattern for Host-based and
Network-based Platform," (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 8, 2021.
• [31] Nicolas-Alin Stoian, "Machine Learning for Anomaly Detection in IoT networks: Malware analysis on the IoT-23 Data set," University of Twente.
• [32] Imtiaz Ullah; Qusay H. Mahmoud, "A Framework for Anomaly Detection in IoT Networks Using Conditional Generative Adversarial Networks," IEEE Access, vol. 9, pp. 165907-
165931, 02 December 2021.
• [33] Imtiaz Ullah; Qusay H. Mahmoud "Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks, “IEEE Access, vol. 9, pp. 103906-103926, 01
July 2021.
• [34] Zhuotao Lian; Chunhua Su "Decentralized Federated Learning for Internet of Things Anomaly Detection", ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on
Computer and Communications Security, pp. 1249-1251, May 2022.