Skip to main content
Erschienen in: Annals of Telecommunications 9-10/2016

01.10.2016

Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems

verfasst von: Haider Abbas, Rabia Latif, Seemab Latif, Ashraf Masood

Erschienen in: Annals of Telecommunications | Ausgabe 9-10/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securing cloud-assisted Wireless Body Area Network (WBAN) environment by applying security mechanism that consumes less resources is still a challenging task. This research makes an attempt to address the same. One of the most prominent attacks in cloud-assisted WBAN is Distributed Denial of Service (DDoS) attack that not only disrupts the communication but also diminishes the network bandwidth and capacity. This work is an extension of our previous research work in which an Enhanced Very Fast Decision Tree (EVFDT) was proposed which could detect DDoS attack successfully. However, in our previous work, the proposed algorithm is evaluated on the dataset generated by implementing LEACH protocol in NS-2. In this paper, a real-time cloud-assisted WBAN test bed is deployed to investigate the efficiency and accuracy of proposed EVFDT algorithm for real-time sensor network traffic. To evaluate the performance of proposed algorithm on real-time WBAN, four metrics are used including classification accuracy, time, memory, and computational cost. It was observed that EVFDT outperforms the existing algorithms by maintaining better results for these metrics even in the presence of extreme noise. Experimental results show that the EVFDT algorithm attains significantly high detection accuracy with less false alarm rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Latif R, Abbas H, Assar S (2014) Distributed Denial of Service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. J Med Syst 38(128):1–10 Latif R, Abbas H, Assar S (2014) Distributed Denial of Service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. J Med Syst 38(128):1–10
2.
Zurück zum Zitat Silva BM, Rodrigues JJ, de la Torre Díez I, López-Coronado M, Saleem K (2015) Mobile-health: a review of current state in 2015. J Biomed Inform 56:265–272, ISSN 1532–0464CrossRef Silva BM, Rodrigues JJ, de la Torre Díez I, López-Coronado M, Saleem K (2015) Mobile-health: a review of current state in 2015. J Biomed Inform 56:265–272, ISSN 1532–0464CrossRef
3.
Zurück zum Zitat Arun RK, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. J Comput Commun 36(3):303–319CrossRef Arun RK, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. J Comput Commun 36(3):303–319CrossRef
4.
Zurück zum Zitat Latif R, Abbas H, Assar S, Latif S (2014) Analyzing feasibility for deploying very fast decision tree for DDoS attack detection in cloud-assisted WBAN. In: Proceedings of 10th International Conference on Intelligent Computing., pp 507–519 Latif R, Abbas H, Assar S, Latif S (2014) Analyzing feasibility for deploying very fast decision tree for DDoS attack detection in cloud-assisted WBAN. In: Proceedings of 10th International Conference on Intelligent Computing., pp 507–519
5.
Zurück zum Zitat Domingos P, Hulten G (2000) Mining high-speed data streams. In: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining., pp 71–80CrossRef Domingos P, Hulten G (2000) Mining high-speed data streams. In: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining., pp 71–80CrossRef
6.
Zurück zum Zitat Deepak A, Puneet S, Vineet S (2014) Impact analysis of Denial of Service (DoS) due to packet flooding. Int J Eng Res Appl 4(6):144–149 Deepak A, Puneet S, Vineet S (2014) Impact analysis of Denial of Service (DoS) due to packet flooding. Int J Eng Res Appl 4(6):144–149
7.
Zurück zum Zitat Zargar ST, Joshi J, Tipper D (2013) ‘A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks’, communications surveys & tutorials. IEEE Commun Soc 15(4):2046–2069 Zargar ST, Joshi J, Tipper D (2013) ‘A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks’, communications surveys & tutorials. IEEE Commun Soc 15(4):2046–2069
8.
Zurück zum Zitat Subbulakshmi T (2011) Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset. In: Proceedings of 3rd International Conference on Advanced Computing (ICoAC)., pp 17–22 Subbulakshmi T (2011) Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset. In: Proceedings of 3rd International Conference on Advanced Computing (ICoAC)., pp 17–22
9.
Zurück zum Zitat Wu YC, Tseng HR, Yang W, Jan RH (2011) DDoS detection and traceback with decision tree and grey relational analysis. Int J Ad Hoc Ubiquit Comput 7(7):121–136CrossRef Wu YC, Tseng HR, Yang W, Jan RH (2011) DDoS detection and traceback with decision tree and grey relational analysis. Int J Ad Hoc Ubiquit Comput 7(7):121–136CrossRef
10.
Zurück zum Zitat Lee SM, Kim DS, Park JS (2012) Detection of DDoS attacks using optimized traffic matrix. Int J Comput Math Appl 63:501–510CrossRef Lee SM, Kim DS, Park JS (2012) Detection of DDoS attacks using optimized traffic matrix. Int J Comput Math Appl 63:501–510CrossRef
11.
Zurück zum Zitat Thwe T, Thandar P (2014) Statistical anomaly detection of DDoS attacks using K-nearest neighbour. Int J Comput Commun Eng Res (IJCCER) 2(1) Thwe T, Thandar P (2014) Statistical anomaly detection of DDoS attacks using K-nearest neighbour. Int J Comput Commun Eng Res (IJCCER) 2(1)
12.
Zurück zum Zitat Latif R, Abbas H, Latif S, Masood A (2015) EVFDT: an Enhanced Very Fast Decision Tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network. Mobile Information Systems, Hindawi Publishing Corporation, Article ID 260594. doi:10.1155/2015/260594 Latif R, Abbas H, Latif S, Masood A (2015) EVFDT: an Enhanced Very Fast Decision Tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network. Mobile Information Systems, Hindawi Publishing Corporation, Article ID 260594. doi:10.​1155/​2015/​260594
13.
Zurück zum Zitat Hulten G, Spencer L, Domingos P (2001) Mining time-changing data streams. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2001. ACM, New York, pp 97–106 Hulten G, Spencer L, Domingos P (2001) Mining time-changing data streams. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD 2001. ACM, New York, pp 97–106
14.
Zurück zum Zitat Yang H, Fong S (2011) Moderated VFDT in stream mining using adaptive tie threshold and incremental pruning. In: Proceedings of the 13th International Conference, DaWaK., pp 471–483 Yang H, Fong S (2011) Moderated VFDT in stream mining using adaptive tie threshold and incremental pruning. In: Proceedings of the 13th International Conference, DaWaK., pp 471–483
15.
Zurück zum Zitat Fawzy A, Hoda MO, Hegazy O (2013) Outliers detection and classification in wireless sensor networks. Egypt Inform J 14:157–164CrossRef Fawzy A, Hoda MO, Hegazy O (2013) Outliers detection and classification in wireless sensor networks. Egypt Inform J 14:157–164CrossRef
18.
Zurück zum Zitat Yang H, Fong S, Sun G, Wong R (2012) A Very Fast Decision Tree algorithm for real-time data mining of imperfect data streams in a distributed wireless sensor network. Int J Distrib Sens Netw. doi:10.1155/2012/863545 Yang H, Fong S, Sun G, Wong R (2012) A Very Fast Decision Tree algorithm for real-time data mining of imperfect data streams in a distributed wireless sensor network. Int J Distrib Sens Netw. doi:10.​1155/​2012/​863545
Metadaten
Titel
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems
verfasst von
Haider Abbas
Rabia Latif
Seemab Latif
Ashraf Masood
Publikationsdatum
01.10.2016
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 9-10/2016
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-016-0495-x

Weitere Artikel der Ausgabe 9-10/2016

Annals of Telecommunications 9-10/2016 Zur Ausgabe