Skip to main content
Top
Published in: Mobile Networks and Applications 4/2022

28-04-2022

A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems

Authors: Nitish Mahajan, Amita Chauhan, Harish Kumar, Sakshi Kaushal, Arun Kumar Sangaiah

Published in: Mobile Networks and Applications | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the era of Internet of Things (IoT) powered by 5G technologies, Automobile Industry is headed towards a revolution. In Intelligent Transport Systems (ITS), vehicles act as connected entities, and exchange data with each other and with the back-end servers on the mobile network. These communications are often session based and require a light weight protocol for session establishment and continuity. Session Initiation Protocol (SIP) can act as the base for this kind of communication. However, its simplicity also makes the protocol vulnerable to various web attacks such as identity theft and Distributed Denial of Service (DDoS). As 5G technologies will enable high data rates to the users, this will also exponentially increase the threat of high-speed DDoS on the servers originating from different sources. Thus, appropriate solutions need to be developed for securing SIP systems from these threats. Machine Learning (ML) has transpired as a building block in cyber security solutions, and a large number of techniques are available to make quick and robust network defense systems by automating the identification of attack flows in the network. In this paper, a Deep Learning-based model is proposed for the identification and alleviation of DDoS attacks in SIP based networks. The work presented here uses a system that is scalable and highly available with load balancing and failover addressing capabilities. The datasets used for conducting experiments are created by emulating SIP sessions, generating DDoS attacks, capturing the normal and attack flows, and extracting time window-based features from the packets. A stacked autoencoder model is trained on the curated datasets to detect various types of DDoS attacks. Once an attack is detected, the Mitigation Policy Recommender module recommends various actions for threat mitigation. Performance of the system is assessed in terms of Accuracy, Precision, Recall and F1-Score. The proposed model obtains a significant improvement in the performance than the previously existing state-of-the-art techniques in terms of accuracy and detection rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
9.
go back to reference Aggarwal S, Mahajan N, Kaushal S, Kumar H (2019) Load balancing and clustering scheme for real-time voip applications. In: Advances in computer communication and computational sciences, pp 451–461. Springer Aggarwal S, Mahajan N, Kaushal S, Kumar H (2019) Load balancing and clustering scheme for real-time voip applications. In: Advances in computer communication and computational sciences, pp 451–461. Springer
10.
go back to reference Akbar A, Basha SM, Sattar SA, Raziuddin S (2016) An intelligent sip message parser for detecting and mitigating ddos attacks. Int J Innov Eng Technol 7(2):1–7 Akbar A, Basha SM, Sattar SA, Raziuddin S (2016) An intelligent sip message parser for detecting and mitigating ddos attacks. Int J Innov Eng Technol 7(2):1–7
11.
go back to reference Akbar MA, Farooq M (2014) Securing sip-based voip infrastructure against flooding attacks and spam over ip telephony. Knowl Inf Syst 38(2):491–510CrossRef Akbar MA, Farooq M (2014) Securing sip-based voip infrastructure against flooding attacks and spam over ip telephony. Knowl Inf Syst 38(2):491–510CrossRef
12.
go back to reference Alam MM, Arafat MY, Ahmed F (2015) Study on auto detecting defence mechanisms against application layer ddos attacks in sip server. J Netw 10(6):344 Alam MM, Arafat MY, Ahmed F (2015) Study on auto detecting defence mechanisms against application layer ddos attacks in sip server. J Netw 10(6):344
13.
go back to reference Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2019) Deepdetect: Detection of distributed denial of service attacks using deep learning. Comput J Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2019) Deepdetect: Detection of distributed denial of service attacks using deep learning. Comput J
14.
go back to reference Blander E, Peles A (2015) Geographic resiliency and load balancing for sip application services. US Patent 9,143,558 Blander E, Peles A (2015) Geographic resiliency and load balancing for sip application services. US Patent 9,143,558
15.
go back to reference Cvitić I, Peraković D, Periša M, Botica M (2019) Novel approach for detection of iot generated ddos traffic. Wireless Netw 1–14 Cvitić I, Peraković D, Periša M, Botica M (2019) Novel approach for detection of iot generated ddos traffic. Wireless Netw 1–14
16.
go back to reference Dassouki K, Safa H, Nassar M, Hijazi A (2017) Protecting from cloud-based sip flooding attacks by leveraging temporal and structural fingerprints. Comput Secur 70:618–633CrossRef Dassouki K, Safa H, Nassar M, Hijazi A (2017) Protecting from cloud-based sip flooding attacks by leveraging temporal and structural fingerprints. Comput Secur 70:618–633CrossRef
17.
go back to reference Dayanandam G, Reddy ES, Babu DB (2017) Regression algorithms for efficient detection and prediction of ddos attacks. In: 2017 3Rd International conference on applied and theoretical computing and communication technology (iCATcct), pp 215–219. IEEE Dayanandam G, Reddy ES, Babu DB (2017) Regression algorithms for efficient detection and prediction of ddos attacks. In: 2017 3Rd International conference on applied and theoretical computing and communication technology (iCATcct), pp 215–219. IEEE
18.
go back to reference Ehlert S, Wang C, Magedanz T, Sisalem D (2008) Specification-based denial-of-service detection for sip voice-over-ip networks. In: 2008 The third international conference on internet monitoring and protection, pp 59–66. IEEE Ehlert S, Wang C, Magedanz T, Sisalem D (2008) Specification-based denial-of-service detection for sip voice-over-ip networks. In: 2008 The third international conference on internet monitoring and protection, pp 59–66. IEEE
19.
go back to reference Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. In: 6Th International symposium for ICS & SCADA cyber security research 2019 6, pp 126–136 Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. In: 6Th International symposium for ICS & SCADA cyber security research 2019 6, pp 126–136
20.
go back to reference Francis PL, Collins DA, Dubois GR, Bunch JL, Pokala NR (2014) Load balancing for sip services. US Patent 8,775,628 Francis PL, Collins DA, Dubois GR, Bunch JL, Pokala NR (2014) Load balancing for sip services. US Patent 8,775,628
21.
go back to reference Gao H, Qin X, Barroso RJD, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial iot api recommendation for software-defined devices: The implicit knowledge discovery perspective. IEEE Trans Emerging Topics Comput Intell Gao H, Qin X, Barroso RJD, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial iot api recommendation for software-defined devices: The implicit knowledge discovery perspective. IEEE Trans Emerging Topics Comput Intell
22.
go back to reference Golait D, Hubballi N (2016) Voipfd: Voice over ip flooding detection. In: 2016 Twenty second national conference on communication (NCC), pp 1–6. IEEE Golait D, Hubballi N (2016) Voipfd: Voice over ip flooding detection. In: 2016 Twenty second national conference on communication (NCC), pp 1–6. IEEE
23.
go back to reference Golait D, Hubballi N (2017) Detecting anomalous behavior in voip systems: a discrete event system modeling. IEEE Trans Inf Forensics Secur 12(3):730–745CrossRef Golait D, Hubballi N (2017) Detecting anomalous behavior in voip systems: a discrete event system modeling. IEEE Trans Inf Forensics Secur 12(3):730–745CrossRef
24.
go back to reference Gutierrez SA, Branch JW (2013) Application of machine learning techniques to distributed denial of service (ddos ) attack detection : A systematic literature review Gutierrez SA, Branch JW (2013) Application of machine learning techniques to distributed denial of service (ddos ) attack detection : A systematic literature review
25.
go back to reference Huang Y, Xu H, Gao H, Ma X, Hussain W (2021) Ssur: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670–681CrossRef Huang Y, Xu H, Gao H, Ma X, Hussain W (2021) Ssur: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670–681CrossRef
26.
go back to reference Jiang H, Iyengar A, Nahum E, Segmuller W, Tantawi AN, Wright CP (2012) Design, implementation, and performance of a load balancer for sip server clusters. IEEE/ACM Trans Netw 20(4):1190–1202CrossRef Jiang H, Iyengar A, Nahum E, Segmuller W, Tantawi AN, Wright CP (2012) Design, implementation, and performance of a load balancer for sip server clusters. IEEE/ACM Trans Netw 20(4):1190–1202CrossRef
27.
go back to reference Kambourakis G, Geneiatakis D, Gritzalis S, Lambrinoudakis C, Dagiuklas T, Ehlert S, Fiedler J (2010) High availability for sip: Solutions and real-time measurement performance evaluation. Int J Disaster Recovery Business Continuity 1(1):11–30 Kambourakis G, Geneiatakis D, Gritzalis S, Lambrinoudakis C, Dagiuklas T, Ehlert S, Fiedler J (2010) High availability for sip: Solutions and real-time measurement performance evaluation. Int J Disaster Recovery Business Continuity 1(1):11–30
28.
go back to reference Kurt B, Yıldız Ç, Ceritli TY, Sankur B, Cemgil AT (2018) A bayesian change point model for detecting sip-based ddos attacks. Digital Signal Processing 77:48–62MathSciNetCrossRef Kurt B, Yıldız Ç, Ceritli TY, Sankur B, Cemgil AT (2018) A bayesian change point model for detecting sip-based ddos attacks. Digital Signal Processing 77:48–62MathSciNetCrossRef
29.
go back to reference Langen AR, Kramer R, Connelly D, Khan RN, Beatty J, Cosmadopoulos I, Cheenath M (2010) Sip server architecture fault tolerance and failover. US Patent 7,661,027 Langen AR, Kramer R, Connelly D, Khan RN, Beatty J, Cosmadopoulos I, Cheenath M (2010) Sip server architecture fault tolerance and failover. US Patent 7,661,027
30.
go back to reference Linda O, Vollmer T, Manic M (2009) Neural network based intrusion detection system for critical infrastructures. In: 2009 International joint conference on neural networks, pp 1827–1834. IEEE Linda O, Vollmer T, Manic M (2009) Neural network based intrusion detection system for critical infrastructures. In: 2009 International joint conference on neural networks, pp 1827–1834. IEEE
31.
go back to reference Ma X, Gao H, Xu H, Bian M (2019) An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing. EURASIP J Wirel Commun Netw 2019(1):1–19CrossRef Ma X, Gao H, Xu H, Bian M (2019) An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing. EURASIP J Wirel Commun Netw 2019(1):1–19CrossRef
32.
go back to reference Manan J, Ahmed A, Ullah I, Merghem-Boulahia L, Gaïti D (2019) Distributed intrusion detection scheme for next generation networks. J Netw Comput Appl 147(102):422 Manan J, Ahmed A, Ullah I, Merghem-Boulahia L, Gaïti D (2019) Distributed intrusion detection scheme for next generation networks. J Netw Comput Appl 147(102):422
33.
go back to reference Mladenov B (2018) Research and solutions for ddos detection and mitigation with software defined networks Mladenov B (2018) Research and solutions for ddos detection and mitigation with software defined networks
34.
go back to reference Nassar M, Festor O, et al. (2010) Labeled voip data-set for intrusion detection evaluation. In: Meeting of the european network of universities and companies in information and communication engineering, pp 97–106. Springer Nassar M, Festor O, et al. (2010) Labeled voip data-set for intrusion detection evaluation. In: Meeting of the european network of universities and companies in information and communication engineering, pp 97–106. Springer
35.
go back to reference Pan Y, Sun F, Teng Z, White J, Schmidt DC, Staples J, Krause L (2019) Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10(1):1–22CrossRef Pan Y, Sun F, Teng Z, White J, Schmidt DC, Staples J, Krause L (2019) Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10(1):1–22CrossRef
36.
go back to reference Rahal R, Korba AA, Ghoualmi-Zine N (2020) Towards the development of realistic dos dataset for intelligent transportation systems. Wirel Pers Commun, 1–30 Rahal R, Korba AA, Ghoualmi-Zine N (2020) Towards the development of realistic dos dataset for intelligent transportation systems. Wirel Pers Commun, 1–30
37.
go back to reference Sanders J (2015) Chinese government linked to largest ddos attack in github history. TechRepublic April Sanders J (2015) Chinese government linked to largest ddos attack in github history. TechRepublic April
39.
go back to reference Semerci M, Cemgil AT, Sankur B (2018) An intelligent cyber security system against ddos attacks in sip networks. Comput Netw 136:137–154CrossRef Semerci M, Cemgil AT, Sankur B (2018) An intelligent cyber security system against ddos attacks in sip networks. Comput Netw 136:137–154CrossRef
40.
go back to reference Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116 Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116
41.
go back to reference Shim CB, Xie L (2010) System and method for load balancing a communications network. US Patent 7,805,517 Shim CB, Xie L (2010) System and method for load balancing a communications network. US Patent 7,805,517
42.
go back to reference Shiravi A, Shiravi H, Tavallaee M, Ghorbani A A (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374CrossRef Shiravi A, Shiravi H, Tavallaee M, Ghorbani A A (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374CrossRef
43.
go back to reference Shoket H, Aulakh JS (2018) Secure voip lte network for secure transmission using plrt (packet level restraining technique) under ddos attack. In: 2018 5Th International conference on signal processing and integrated networks (SPIN), pp 878–882. IEEE Shoket H, Aulakh JS (2018) Secure voip lte network for secure transmission using plrt (packet level restraining technique) under ddos attack. In: 2018 5Th International conference on signal processing and integrated networks (SPIN), pp 878–882. IEEE
44.
go back to reference Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerging Topics Comput Intell 2(1):41–50CrossRef Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerging Topics Comput Intell 2(1):41–50CrossRef
45.
go back to reference Tas IM, Ugurdogan B, Baktir S (2016) Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies. Comput Secur 63:29–44CrossRef Tas IM, Ugurdogan B, Baktir S (2016) Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies. Comput Secur 63:29–44CrossRef
46.
go back to reference Tsiatsikas Z, Fakis A, Papamartzivanos D, Geneiatakis D, Kambourakis G, Kolias C (2015) Battling against ddos in sip: is machine learning-based detection an effective weapon?. In: E-business and telecommunications (ICETE), 2015 12th international joint conference on, vol 4, pp 301–308. IEEE Tsiatsikas Z, Fakis A, Papamartzivanos D, Geneiatakis D, Kambourakis G, Kolias C (2015) Battling against ddos in sip: is machine learning-based detection an effective weapon?. In: E-business and telecommunications (ICETE), 2015 12th international joint conference on, vol 4, pp 301–308. IEEE
47.
go back to reference Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD (2015) An efficient and easily deployable method for dealing with dos in sip services. Comput Commun 57:50–63CrossRef Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD (2015) An efficient and easily deployable method for dealing with dos in sip services. Comput Commun 57:50–63CrossRef
48.
go back to reference Wang C, Wu J, Zheng X, Pei B, Zhang X, Yu D, Tang J (2020) Leveraging icn with network sensing for intelligent transportation systems: A dynamic naming approach. IEEE Sensors Journal Wang C, Wu J, Zheng X, Pei B, Zhang X, Yu D, Tang J (2020) Leveraging icn with network sensing for intelligent transportation systems: A dynamic naming approach. IEEE Sensors Journal
49.
go back to reference Yang X, Zhou S, Cao M (2020) An approach to alleviate the sparsity problem of hybrid collaborative filtering based recommendations: The product-attribute perspective from user reviews. Mobile Networks & Applications 25(2) Yang X, Zhou S, Cao M (2020) An approach to alleviate the sparsity problem of hybrid collaborative filtering based recommendations: The product-attribute perspective from user reviews. Mobile Networks & Applications 25(2)
50.
go back to reference Yin Y, Cao Z, Xu Y, Gao H, Li R, Mai Z (2020) Qos prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cogn Commun Netw 6 (4):1136–1145CrossRef Yin Y, Cao Z, Xu Y, Gao H, Li R, Mai Z (2020) Qos prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cogn Commun Netw 6 (4):1136–1145CrossRef
51.
go back to reference Yu J (2016) An empirical study of denial of service (dos) against voip. In: 2016 15Th international conference on ubiquitous computing and communications and 2016 international symposium on cyberspace and security (IUCC-CSS), pp 54–60. IEEE, Yu J (2016) An empirical study of denial of service (dos) against voip. In: 2016 15Th international conference on ubiquitous computing and communications and 2016 international symposium on cyberspace and security (IUCC-CSS), pp 54–60. IEEE,
52.
go back to reference Yuan X, Li C, Li X (2017) Deepdefense: identifying ddos attack via deep learning. In: 2017 IEEE International conference on smart computing (SMARTCOMP), pp 1–8. IEEE Yuan X, Li C, Li X (2017) Deepdefense: identifying ddos attack via deep learning. In: 2017 IEEE International conference on smart computing (SMARTCOMP), pp 1–8. IEEE
Metadata
Title
A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems
Authors
Nitish Mahajan
Amita Chauhan
Harish Kumar
Sakshi Kaushal
Arun Kumar Sangaiah
Publication date
28-04-2022
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 4/2022
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-022-01973-z

Other articles of this Issue 4/2022

Mobile Networks and Applications 4/2022 Go to the issue