ABSTRACT
In recent years, there has been a significant surge in the deployment of Internet of Things (IoT) devices, which has consequently escalated security threats, notably Distributed Denial of Service (DDoS) attacks. Our prior research developed an LSTM-based framework for detecting futuristic DDoS attacks but largely relied on simulated datasets [1]. To bridge this gap, we designed a Raspberry Pi (RPi) testbed that mimics the complexities of large-scale IoT networks. This setup allows us to simulate realistic DDoS attacks originating from IoT devices and evaluate the effectiveness of various DDoS detection techniques. Specifically, using this RPi testbed, we validated the effectiveness of our LSTM-based framework in identifying futuristic DDoS attacks, observing an F1 score ranging between 0.8 and 0.86 depending on the aggressiveness of the DDoS attack.
- Arvin Hekmati, Nishant Jethwa, Eugenio Grippo, and Bhaskar Krishnamachari. 2023. Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems. arXiv preprint arXiv:2302.07982 (2023).Google Scholar
Recommendations
PhD Forum Abstract: DDoS attack detection in IoT systems using Neural Networks
IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor NetworksThis short paper summarizes our recent/ongoing works [2, 3, 4] on detecting DDoS attacks in IoT systems. In our studies, we conducted a thorough examination of using machine learning to detect Distributed Denial of Service (DDoS) attacks in large-scale ...
DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol
AbstractAdversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out attacks, such as denial-of-service (DoS) attacks, either against the IoT devices ...
Source-End DDoS Defense in IoT Environments
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyWhile the Internet of Things (IoT) becomes increasingly popular and pervasive in everyday objects, IoT devices often remain unprotected and can be exploited to launch large-scale distributed denial-of-service (DDoS) attacks. One could attempt to employ ...
Comments