Skip to main content
Erschienen in: Mobile Networks and Applications 4/2022

28.04.2022

A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems

verfasst von: Nitish Mahajan, Amita Chauhan, Harish Kumar, Sakshi Kaushal, Arun Kumar Sangaiah

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the era of Internet of Things (IoT) powered by 5G technologies, Automobile Industry is headed towards a revolution. In Intelligent Transport Systems (ITS), vehicles act as connected entities, and exchange data with each other and with the back-end servers on the mobile network. These communications are often session based and require a light weight protocol for session establishment and continuity. Session Initiation Protocol (SIP) can act as the base for this kind of communication. However, its simplicity also makes the protocol vulnerable to various web attacks such as identity theft and Distributed Denial of Service (DDoS). As 5G technologies will enable high data rates to the users, this will also exponentially increase the threat of high-speed DDoS on the servers originating from different sources. Thus, appropriate solutions need to be developed for securing SIP systems from these threats. Machine Learning (ML) has transpired as a building block in cyber security solutions, and a large number of techniques are available to make quick and robust network defense systems by automating the identification of attack flows in the network. In this paper, a Deep Learning-based model is proposed for the identification and alleviation of DDoS attacks in SIP based networks. The work presented here uses a system that is scalable and highly available with load balancing and failover addressing capabilities. The datasets used for conducting experiments are created by emulating SIP sessions, generating DDoS attacks, capturing the normal and attack flows, and extracting time window-based features from the packets. A stacked autoencoder model is trained on the curated datasets to detect various types of DDoS attacks. Once an attack is detected, the Mitigation Policy Recommender module recommends various actions for threat mitigation. Performance of the system is assessed in terms of Accuracy, Precision, Recall and F1-Score. The proposed model obtains a significant improvement in the performance than the previously existing state-of-the-art techniques in terms of accuracy and detection rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
9.
Zurück zum Zitat Aggarwal S, Mahajan N, Kaushal S, Kumar H (2019) Load balancing and clustering scheme for real-time voip applications. In: Advances in computer communication and computational sciences, pp 451–461. Springer Aggarwal S, Mahajan N, Kaushal S, Kumar H (2019) Load balancing and clustering scheme for real-time voip applications. In: Advances in computer communication and computational sciences, pp 451–461. Springer
10.
Zurück zum Zitat Akbar A, Basha SM, Sattar SA, Raziuddin S (2016) An intelligent sip message parser for detecting and mitigating ddos attacks. Int J Innov Eng Technol 7(2):1–7 Akbar A, Basha SM, Sattar SA, Raziuddin S (2016) An intelligent sip message parser for detecting and mitigating ddos attacks. Int J Innov Eng Technol 7(2):1–7
11.
Zurück zum Zitat Akbar MA, Farooq M (2014) Securing sip-based voip infrastructure against flooding attacks and spam over ip telephony. Knowl Inf Syst 38(2):491–510CrossRef Akbar MA, Farooq M (2014) Securing sip-based voip infrastructure against flooding attacks and spam over ip telephony. Knowl Inf Syst 38(2):491–510CrossRef
12.
Zurück zum Zitat Alam MM, Arafat MY, Ahmed F (2015) Study on auto detecting defence mechanisms against application layer ddos attacks in sip server. J Netw 10(6):344 Alam MM, Arafat MY, Ahmed F (2015) Study on auto detecting defence mechanisms against application layer ddos attacks in sip server. J Netw 10(6):344
13.
Zurück zum Zitat Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2019) Deepdetect: Detection of distributed denial of service attacks using deep learning. Comput J Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2019) Deepdetect: Detection of distributed denial of service attacks using deep learning. Comput J
14.
Zurück zum Zitat Blander E, Peles A (2015) Geographic resiliency and load balancing for sip application services. US Patent 9,143,558 Blander E, Peles A (2015) Geographic resiliency and load balancing for sip application services. US Patent 9,143,558
15.
Zurück zum Zitat Cvitić I, Peraković D, Periša M, Botica M (2019) Novel approach for detection of iot generated ddos traffic. Wireless Netw 1–14 Cvitić I, Peraković D, Periša M, Botica M (2019) Novel approach for detection of iot generated ddos traffic. Wireless Netw 1–14
16.
Zurück zum Zitat Dassouki K, Safa H, Nassar M, Hijazi A (2017) Protecting from cloud-based sip flooding attacks by leveraging temporal and structural fingerprints. Comput Secur 70:618–633CrossRef Dassouki K, Safa H, Nassar M, Hijazi A (2017) Protecting from cloud-based sip flooding attacks by leveraging temporal and structural fingerprints. Comput Secur 70:618–633CrossRef
17.
Zurück zum Zitat Dayanandam G, Reddy ES, Babu DB (2017) Regression algorithms for efficient detection and prediction of ddos attacks. In: 2017 3Rd International conference on applied and theoretical computing and communication technology (iCATcct), pp 215–219. IEEE Dayanandam G, Reddy ES, Babu DB (2017) Regression algorithms for efficient detection and prediction of ddos attacks. In: 2017 3Rd International conference on applied and theoretical computing and communication technology (iCATcct), pp 215–219. IEEE
18.
Zurück zum Zitat Ehlert S, Wang C, Magedanz T, Sisalem D (2008) Specification-based denial-of-service detection for sip voice-over-ip networks. In: 2008 The third international conference on internet monitoring and protection, pp 59–66. IEEE Ehlert S, Wang C, Magedanz T, Sisalem D (2008) Specification-based denial-of-service detection for sip voice-over-ip networks. In: 2008 The third international conference on internet monitoring and protection, pp 59–66. IEEE
19.
Zurück zum Zitat Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. In: 6Th International symposium for ICS & SCADA cyber security research 2019 6, pp 126–136 Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. In: 6Th International symposium for ICS & SCADA cyber security research 2019 6, pp 126–136
20.
Zurück zum Zitat Francis PL, Collins DA, Dubois GR, Bunch JL, Pokala NR (2014) Load balancing for sip services. US Patent 8,775,628 Francis PL, Collins DA, Dubois GR, Bunch JL, Pokala NR (2014) Load balancing for sip services. US Patent 8,775,628
21.
Zurück zum Zitat Gao H, Qin X, Barroso RJD, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial iot api recommendation for software-defined devices: The implicit knowledge discovery perspective. IEEE Trans Emerging Topics Comput Intell Gao H, Qin X, Barroso RJD, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial iot api recommendation for software-defined devices: The implicit knowledge discovery perspective. IEEE Trans Emerging Topics Comput Intell
22.
Zurück zum Zitat Golait D, Hubballi N (2016) Voipfd: Voice over ip flooding detection. In: 2016 Twenty second national conference on communication (NCC), pp 1–6. IEEE Golait D, Hubballi N (2016) Voipfd: Voice over ip flooding detection. In: 2016 Twenty second national conference on communication (NCC), pp 1–6. IEEE
23.
Zurück zum Zitat Golait D, Hubballi N (2017) Detecting anomalous behavior in voip systems: a discrete event system modeling. IEEE Trans Inf Forensics Secur 12(3):730–745CrossRef Golait D, Hubballi N (2017) Detecting anomalous behavior in voip systems: a discrete event system modeling. IEEE Trans Inf Forensics Secur 12(3):730–745CrossRef
24.
Zurück zum Zitat Gutierrez SA, Branch JW (2013) Application of machine learning techniques to distributed denial of service (ddos ) attack detection : A systematic literature review Gutierrez SA, Branch JW (2013) Application of machine learning techniques to distributed denial of service (ddos ) attack detection : A systematic literature review
25.
Zurück zum Zitat Huang Y, Xu H, Gao H, Ma X, Hussain W (2021) Ssur: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670–681CrossRef Huang Y, Xu H, Gao H, Ma X, Hussain W (2021) Ssur: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670–681CrossRef
26.
Zurück zum Zitat Jiang H, Iyengar A, Nahum E, Segmuller W, Tantawi AN, Wright CP (2012) Design, implementation, and performance of a load balancer for sip server clusters. IEEE/ACM Trans Netw 20(4):1190–1202CrossRef Jiang H, Iyengar A, Nahum E, Segmuller W, Tantawi AN, Wright CP (2012) Design, implementation, and performance of a load balancer for sip server clusters. IEEE/ACM Trans Netw 20(4):1190–1202CrossRef
27.
Zurück zum Zitat Kambourakis G, Geneiatakis D, Gritzalis S, Lambrinoudakis C, Dagiuklas T, Ehlert S, Fiedler J (2010) High availability for sip: Solutions and real-time measurement performance evaluation. Int J Disaster Recovery Business Continuity 1(1):11–30 Kambourakis G, Geneiatakis D, Gritzalis S, Lambrinoudakis C, Dagiuklas T, Ehlert S, Fiedler J (2010) High availability for sip: Solutions and real-time measurement performance evaluation. Int J Disaster Recovery Business Continuity 1(1):11–30
28.
Zurück zum Zitat Kurt B, Yıldız Ç, Ceritli TY, Sankur B, Cemgil AT (2018) A bayesian change point model for detecting sip-based ddos attacks. Digital Signal Processing 77:48–62MathSciNetCrossRef Kurt B, Yıldız Ç, Ceritli TY, Sankur B, Cemgil AT (2018) A bayesian change point model for detecting sip-based ddos attacks. Digital Signal Processing 77:48–62MathSciNetCrossRef
29.
Zurück zum Zitat Langen AR, Kramer R, Connelly D, Khan RN, Beatty J, Cosmadopoulos I, Cheenath M (2010) Sip server architecture fault tolerance and failover. US Patent 7,661,027 Langen AR, Kramer R, Connelly D, Khan RN, Beatty J, Cosmadopoulos I, Cheenath M (2010) Sip server architecture fault tolerance and failover. US Patent 7,661,027
30.
Zurück zum Zitat Linda O, Vollmer T, Manic M (2009) Neural network based intrusion detection system for critical infrastructures. In: 2009 International joint conference on neural networks, pp 1827–1834. IEEE Linda O, Vollmer T, Manic M (2009) Neural network based intrusion detection system for critical infrastructures. In: 2009 International joint conference on neural networks, pp 1827–1834. IEEE
31.
Zurück zum Zitat Ma X, Gao H, Xu H, Bian M (2019) An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing. EURASIP J Wirel Commun Netw 2019(1):1–19CrossRef Ma X, Gao H, Xu H, Bian M (2019) An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing. EURASIP J Wirel Commun Netw 2019(1):1–19CrossRef
32.
Zurück zum Zitat Manan J, Ahmed A, Ullah I, Merghem-Boulahia L, Gaïti D (2019) Distributed intrusion detection scheme for next generation networks. J Netw Comput Appl 147(102):422 Manan J, Ahmed A, Ullah I, Merghem-Boulahia L, Gaïti D (2019) Distributed intrusion detection scheme for next generation networks. J Netw Comput Appl 147(102):422
33.
Zurück zum Zitat Mladenov B (2018) Research and solutions for ddos detection and mitigation with software defined networks Mladenov B (2018) Research and solutions for ddos detection and mitigation with software defined networks
34.
Zurück zum Zitat Nassar M, Festor O, et al. (2010) Labeled voip data-set for intrusion detection evaluation. In: Meeting of the european network of universities and companies in information and communication engineering, pp 97–106. Springer Nassar M, Festor O, et al. (2010) Labeled voip data-set for intrusion detection evaluation. In: Meeting of the european network of universities and companies in information and communication engineering, pp 97–106. Springer
35.
Zurück zum Zitat Pan Y, Sun F, Teng Z, White J, Schmidt DC, Staples J, Krause L (2019) Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10(1):1–22CrossRef Pan Y, Sun F, Teng Z, White J, Schmidt DC, Staples J, Krause L (2019) Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10(1):1–22CrossRef
36.
Zurück zum Zitat Rahal R, Korba AA, Ghoualmi-Zine N (2020) Towards the development of realistic dos dataset for intelligent transportation systems. Wirel Pers Commun, 1–30 Rahal R, Korba AA, Ghoualmi-Zine N (2020) Towards the development of realistic dos dataset for intelligent transportation systems. Wirel Pers Commun, 1–30
37.
Zurück zum Zitat Sanders J (2015) Chinese government linked to largest ddos attack in github history. TechRepublic April Sanders J (2015) Chinese government linked to largest ddos attack in github history. TechRepublic April
39.
Zurück zum Zitat Semerci M, Cemgil AT, Sankur B (2018) An intelligent cyber security system against ddos attacks in sip networks. Comput Netw 136:137–154CrossRef Semerci M, Cemgil AT, Sankur B (2018) An intelligent cyber security system against ddos attacks in sip networks. Comput Netw 136:137–154CrossRef
40.
Zurück zum Zitat Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116 Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116
41.
Zurück zum Zitat Shim CB, Xie L (2010) System and method for load balancing a communications network. US Patent 7,805,517 Shim CB, Xie L (2010) System and method for load balancing a communications network. US Patent 7,805,517
42.
Zurück zum Zitat Shiravi A, Shiravi H, Tavallaee M, Ghorbani A A (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374CrossRef Shiravi A, Shiravi H, Tavallaee M, Ghorbani A A (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374CrossRef
43.
Zurück zum Zitat Shoket H, Aulakh JS (2018) Secure voip lte network for secure transmission using plrt (packet level restraining technique) under ddos attack. In: 2018 5Th International conference on signal processing and integrated networks (SPIN), pp 878–882. IEEE Shoket H, Aulakh JS (2018) Secure voip lte network for secure transmission using plrt (packet level restraining technique) under ddos attack. In: 2018 5Th International conference on signal processing and integrated networks (SPIN), pp 878–882. IEEE
44.
Zurück zum Zitat Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerging Topics Comput Intell 2(1):41–50CrossRef Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerging Topics Comput Intell 2(1):41–50CrossRef
45.
Zurück zum Zitat Tas IM, Ugurdogan B, Baktir S (2016) Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies. Comput Secur 63:29–44CrossRef Tas IM, Ugurdogan B, Baktir S (2016) Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies. Comput Secur 63:29–44CrossRef
46.
Zurück zum Zitat Tsiatsikas Z, Fakis A, Papamartzivanos D, Geneiatakis D, Kambourakis G, Kolias C (2015) Battling against ddos in sip: is machine learning-based detection an effective weapon?. In: E-business and telecommunications (ICETE), 2015 12th international joint conference on, vol 4, pp 301–308. IEEE Tsiatsikas Z, Fakis A, Papamartzivanos D, Geneiatakis D, Kambourakis G, Kolias C (2015) Battling against ddos in sip: is machine learning-based detection an effective weapon?. In: E-business and telecommunications (ICETE), 2015 12th international joint conference on, vol 4, pp 301–308. IEEE
47.
Zurück zum Zitat Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD (2015) An efficient and easily deployable method for dealing with dos in sip services. Comput Commun 57:50–63CrossRef Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD (2015) An efficient and easily deployable method for dealing with dos in sip services. Comput Commun 57:50–63CrossRef
48.
Zurück zum Zitat Wang C, Wu J, Zheng X, Pei B, Zhang X, Yu D, Tang J (2020) Leveraging icn with network sensing for intelligent transportation systems: A dynamic naming approach. IEEE Sensors Journal Wang C, Wu J, Zheng X, Pei B, Zhang X, Yu D, Tang J (2020) Leveraging icn with network sensing for intelligent transportation systems: A dynamic naming approach. IEEE Sensors Journal
49.
Zurück zum Zitat Yang X, Zhou S, Cao M (2020) An approach to alleviate the sparsity problem of hybrid collaborative filtering based recommendations: The product-attribute perspective from user reviews. Mobile Networks & Applications 25(2) Yang X, Zhou S, Cao M (2020) An approach to alleviate the sparsity problem of hybrid collaborative filtering based recommendations: The product-attribute perspective from user reviews. Mobile Networks & Applications 25(2)
50.
Zurück zum Zitat Yin Y, Cao Z, Xu Y, Gao H, Li R, Mai Z (2020) Qos prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cogn Commun Netw 6 (4):1136–1145CrossRef Yin Y, Cao Z, Xu Y, Gao H, Li R, Mai Z (2020) Qos prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cogn Commun Netw 6 (4):1136–1145CrossRef
51.
Zurück zum Zitat Yu J (2016) An empirical study of denial of service (dos) against voip. In: 2016 15Th international conference on ubiquitous computing and communications and 2016 international symposium on cyberspace and security (IUCC-CSS), pp 54–60. IEEE, Yu J (2016) An empirical study of denial of service (dos) against voip. In: 2016 15Th international conference on ubiquitous computing and communications and 2016 international symposium on cyberspace and security (IUCC-CSS), pp 54–60. IEEE,
52.
Zurück zum Zitat Yuan X, Li C, Li X (2017) Deepdefense: identifying ddos attack via deep learning. In: 2017 IEEE International conference on smart computing (SMARTCOMP), pp 1–8. IEEE Yuan X, Li C, Li X (2017) Deepdefense: identifying ddos attack via deep learning. In: 2017 IEEE International conference on smart computing (SMARTCOMP), pp 1–8. IEEE
Metadaten
Titel
A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems
verfasst von
Nitish Mahajan
Amita Chauhan
Harish Kumar
Sakshi Kaushal
Arun Kumar Sangaiah
Publikationsdatum
28.04.2022
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2022
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-022-01973-z

Weitere Artikel der Ausgabe 4/2022

Mobile Networks and Applications 4/2022 Zur Ausgabe