Skip to main content

DeepDDoS: A Deep-Learning Model for Detecting Software Defined Healthcare IoT Networks Attacks

  • Conference paper
  • First Online:
Ubiquitous Networking (UNet 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 12845))

Included in the following conference series:

Abstract

Internet of Things (IoT) brings major security challenges that have prominent social impact. Sensors diversity as well huge amount of generated data represent a big concern for handling security issues. Therefore, companies and organizations are exposed to increasingly aggressive attacks such as ransomware, denial of service (DoS), and distributed denial of service (DDoS). Although IoT devices bring a substantial socio-economic benefits, attacks can create drastically social problems within organizations like hospitals. According to healthcare-based IoT environment, attacks can impact real-time patient data monitoring/collection and consequently effect decision making with respect to critical healthcare IoT devices such as blood pressure, blood sugar levels, oxygen, weight, and even ECGs, etc. In this paper, we propose DeepDDoS, a stable framework that considers deep learning techniques to detect and mitigate, in real time, DoS/DDoS attacks within healthcare-based IoT environment. By leveraging the public available CICDDoS2019 dataset, we show that DeepDDoS outperforms previous studies and achieves a prediction model equals to \(98.8\%\). In addition, DeepDDoS architecture gives an enhanced processing delay.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.vectra.ai/news/vectra-networks-identifies-healthcare-as-the-industry-most-targeted-by-cyber-attacks. Accessed: 6 May 2020

  2. Yuan, X., Li, C., Li, C.: DeepDefense: identifying DDoS attack via deep learning. In: Proceedings of the SMARTCOMP, pp. 1–8, China (2017)

    Google Scholar 

  3. Elsayed, M.S., Le-Khac, N. -A., Dev, S., Jurcut, A.D.: DDoSNet: a deep-learning model for detecting network attacks. In: IEEE 21st International Symposium on WoWMoM, pp. 391–396, Ireland (2020)

    Google Scholar 

  4. Nanda, S., Zafari, F., DeCusatis, C., Wedaa, E., Yang, B.: Predicting network attack patterns in SDN using machine learning approach. In: IEEE NFV-SDN, pp. 167–172 (2016)

    Google Scholar 

  5. Roopak, N., Tian, G.Y., Chambers, J.: Deep learning models for cyber security in IoT networks. In: Proceedings of the IEEE CCWC, pp. 0452–0457 (2019)

    Google Scholar 

  6. Cisco annual internet report. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.htm. Accessed: 6 Oct 2020

  7. http://www.numerique.gouv.sn/sites/default/files/SNC2022-vf.pdf.Accessed: 6 Oct 2020

  8. Ghanbari, M., Kinsner, W.: Extracting features from both the input and the output of a convolutional neural network to detect distributed denial of service attacks. In: IEEE ICCI*CC (2018)

    Google Scholar 

  9. Guide to DDoS Attacks November (2017). https://www.cisecurity.org/white-papers/technical-white-paper-guide-to-ddos-attacks.Accessed: 06 Oct 2020

  10. Bassene, A., Gueye, B.: A group-based INT devices classification through network traffic analysis based on machine learning approach. In: Zitouni, R., Phokeer, A., Chavula, J., Elmokashfi, A., Gueye, A., Benamar, N. (eds.) AFRICOMM 2020. LNICSSITE, vol. 361, pp. 185–202. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-70572-5_12

  11. Hahnloser, R.H., Sarpeshkar, R., Mahowald, M.A., Douglas, R.J., Seung, H.S.: Digital selection and analogue amplification coexist in a cortex-inspired silicon circuit. Nature 405, 947–951 (2000)

    Google Scholar 

  12. Doriguzzi-Corin, R., Millar, S., Scott-Hayward, S., Martínez-del-Rincón, J., Siracusa, D.: Lucid: a practical, lightweight deep learning solution for DDOS attack detection. IEEE TNSM 17(2), 876–889 (2020)

    Google Scholar 

  13. Ioffe, S., Szegedy, C.: Batch normalization: Accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32nd International Conference on International Conference on Machine Learning (2015)

    Google Scholar 

  14. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A. : Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy (ICISSP), pp. 108–116, January 2018

    Google Scholar 

  15. CICDDoS2019 dataset. http://205.174.165.80/CICDataset/CICDDoS2019. Accessed 20 Feb 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avewe Bassene .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bassene, A., Gueye, B. (2021). DeepDDoS: A Deep-Learning Model for Detecting Software Defined Healthcare IoT Networks Attacks. In: Elbiaze, H., Sabir, E., Falcone, F., Sadik, M., Lasaulce, S., Ben Othman, J. (eds) Ubiquitous Networking. UNet 2021. Lecture Notes in Computer Science(), vol 12845. Springer, Cham. https://doi.org/10.1007/978-3-030-86356-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86356-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86355-5

  • Online ISBN: 978-3-030-86356-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics