Skip to main content

2022 | OriginalPaper | Buchkapitel

Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems

verfasst von : Akshat Gaurav, B. B. Gupta, Kwok Tai Chui

Erschienen in: Cyber Security, Privacy and Networking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Vehicular ad hoc networks (VANETs) are a critical component of intelligent transportation systems (ITS). Because VANET allows the transmission of critical and life-saving information between vehicle nodes, any effort to compromise the network should be recognized immediately, if at all feasible. The distributed denial-of-service (DDoS) assault is one kind of cyber-attack that affects VANET systems’ availability.     As a consequence of the DDoS assault, vehicle nodes are unable to transmit vital information. In this context, this experiment proposed edge computing-based DDoS detection techniques. The proposed technique uses packet entropy to distinguish DDoS attack traffic from normal communication. To determine the entropy values, we performed an in-depth study of five different machine learning methods. precision, accuracy, f1 measure, and recall are used to assess the performance of different machine learning methods

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adhikary K, Bhushan S, Kumar S, Dutta K (2020) Hybrid algorithm to detect ddos attacks in vanets. Wireless Pers Commun 1–22 Adhikary K, Bhushan S, Kumar S, Dutta K (2020) Hybrid algorithm to detect ddos attacks in vanets. Wireless Pers Commun 1–22
2.
Zurück zum Zitat Behrisch M, Bieker L, Erdmann J, Krajzewicz D (2011) Sumo–simulation of urban mobility: an overview. In: Proceedings of SIMUL 2011, the third international conference on advances in system simulation, ThinkMind Behrisch M, Bieker L, Erdmann J, Krajzewicz D (2011) Sumo–simulation of urban mobility: an overview. In: Proceedings of SIMUL 2011, the third international conference on advances in system simulation, ThinkMind
3.
Zurück zum Zitat Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Hum Comput 10(5):1985–1997 Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Hum Comput 10(5):1985–1997
4.
Zurück zum Zitat Chhabra M, Gupta B, Almomani A (2013) A novel solution to handle ddos attack in manet Chhabra M, Gupta B, Almomani A (2013) A novel solution to handle ddos attack in manet
5.
Zurück zum Zitat Cui J, Wei L, Zhong H, Zhang J, Xu Y, Liu L (2020) Edge computing in vanets-an efficient and privacy-preserving cooperative downloading scheme. IEEE J Sel Areas Commun 38(6):1191–1204CrossRef Cui J, Wei L, Zhong H, Zhang J, Xu Y, Liu L (2020) Edge computing in vanets-an efficient and privacy-preserving cooperative downloading scheme. IEEE J Sel Areas Commun 38(6):1191–1204CrossRef
6.
Zurück zum Zitat Cvitić I, Peraković D, Gupta B, Choo KKR (2021) Boosting-based DDoS detection in Internet of Things systems. IEEE Internet of Things J Cvitić I, Peraković D, Gupta B, Choo KKR (2021) Boosting-based DDoS detection in Internet of Things systems. IEEE Internet of Things J
7.
Zurück zum Zitat Dahiya A, Gupta BB (2021) A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst 117:193–204 Dahiya A, Gupta BB (2021) A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. Future Gener Comput Syst 117:193–204
8.
Zurück zum Zitat Gaurav A, Gupta B, Castiglione A, Psannis K, Choi C (2020) A novel approach for fake news detection in vehicular ad-hoc network (vanet). In: International conference on computational data and social networks. Springer, Berlin, pp 386–397 Gaurav A, Gupta B, Castiglione A, Psannis K, Choi C (2020) A novel approach for fake news detection in vehicular ad-hoc network (vanet). In: International conference on computational data and social networks. Springer, Berlin, pp 386–397
9.
Zurück zum Zitat Gaurav A, Singh AK (2018) Light weight approach for secure backbone construction for manets. J King Saud Univ-Comput Inf Sci Gaurav A, Singh AK (2018) Light weight approach for secure backbone construction for manets. J King Saud Univ-Comput Inf Sci
10.
Zurück zum Zitat Ghori MR, Zamli KZ, Quosthoni N, Hisyam M, Montaser M (2018) Vehicular ad-hoc network (vanet). In: 2018 IEEE international conference on innovative research and development (ICIRD). IEEE, pp. 1–6 Ghori MR, Zamli KZ, Quosthoni N, Hisyam M, Montaser M (2018) Vehicular ad-hoc network (vanet). In: 2018 IEEE international conference on innovative research and development (ICIRD). IEEE, pp. 1–6
11.
Zurück zum Zitat Gou Z, Yamaguchi S, Gupta B (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity theft: breakthroughs in research and practice. IGI Global, pp 221–247 Gou Z, Yamaguchi S, Gupta B (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity theft: breakthroughs in research and practice. IGI Global, pp 221–247
12.
Zurück zum Zitat Gu K, Dong X, Jia W (2020) Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets. IEEE Trans Cloud Comput Gu K, Dong X, Jia W (2020) Malicious node detection scheme based on correlation of data and network topology in fog computing-based vanets. IEEE Trans Cloud Comput
13.
Zurück zum Zitat Kolandaisamy R, Noor RM, Kolandaisamy I, Ahmedy I, Kiah MLM, Tamil MEM, Nandy T (2020) A stream position performance analysis model based on ddos attack detection for cluster-based routing in vanet. J Ambient Intell Hum Comput 1–14 Kolandaisamy R, Noor RM, Kolandaisamy I, Ahmedy I, Kiah MLM, Tamil MEM, Nandy T (2020) A stream position performance analysis model based on ddos attack detection for cluster-based routing in vanet. J Ambient Intell Hum Comput 1–14
14.
Zurück zum Zitat Mishra A, Gupta N, Gupta B (2021) Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun Syst 77(1):47–62 Mishra A, Gupta N, Gupta B (2021) Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun Syst 77(1):47–62
15.
Zurück zum Zitat Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304CrossRef Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304CrossRef
16.
Zurück zum Zitat Shidaganti GI, Inamdar AS, Rai SV, Rajeev AM (2020) Scef: a model for prevention of ddos attacks from the cloud. Int J Cloud Appl Comput (IJCAC) 10(3):67–80 Shidaganti GI, Inamdar AS, Rai SV, Rajeev AM (2020) Scef: a model for prevention of ddos attacks from the cloud. Int J Cloud Appl Comput (IJCAC) 10(3):67–80
17.
Zurück zum Zitat Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved ivc analysis. IEEE Trans Mob Comput 10(1):3–15CrossRef Sommer C, German R, Dressler F (2010) Bidirectionally coupled network and road traffic simulation for improved ivc analysis. IEEE Trans Mob Comput 10(1):3–15CrossRef
18.
Zurück zum Zitat Srivastava A, Gupta B, Tyagi A, Sharma A, Mishra A (2011) A recent survey on ddos attacks and defense mechanisms. In: International conference on parallel distributed computing technologies and applications. Springer, Berlin, pp 570–580 Srivastava A, Gupta B, Tyagi A, Sharma A, Mishra A (2011) A recent survey on ddos attacks and defense mechanisms. In: International conference on parallel distributed computing technologies and applications. Springer, Berlin, pp 570–580
19.
Zurück zum Zitat Tanwar S, Vora J, Tyagi S, Kumar N, Obaidat MS (2018) A systematic review on security issues in vehicular ad hoc network. Secur Privacy 1(5):e39CrossRef Tanwar S, Vora J, Tyagi S, Kumar N, Obaidat MS (2018) A systematic review on security issues in vehicular ad hoc network. Secur Privacy 1(5):e39CrossRef
20.
Zurück zum Zitat Tewari A, Gupta BB (2020) Secure timestamp-based mutual authentication protocol for iot devices using rfid tags. Int J Semantic Web Inf Syst (IJSWIS) 16(3):20–34CrossRef Tewari A, Gupta BB (2020) Secure timestamp-based mutual authentication protocol for iot devices using rfid tags. Int J Semantic Web Inf Syst (IJSWIS) 16(3):20–34CrossRef
21.
Zurück zum Zitat Tripathi S, Gupta B, Almomani A, Mishra A, Veluru S (2013) Hadoop based defense solution to handle distributed denial of service (ddos) attacks Tripathi S, Gupta B, Almomani A, Mishra A, Veluru S (2013) Hadoop based defense solution to handle distributed denial of service (ddos) attacks
22.
Zurück zum Zitat Varga A (2019) A practical introduction to the omnet++ simulation framework. In: Recent advances in network simulation. Springer, Berlin, pp 3–51 Varga A (2019) A practical introduction to the omnet++ simulation framework. In: Recent advances in network simulation. Springer, Berlin, pp 3–51
Metadaten
Titel
Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
verfasst von
Akshat Gaurav
B. B. Gupta
Kwok Tai Chui
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-8664-1_16

Neuer Inhalt