The rapid growth of cloud computing has led to the development of the Software-Defined Network (SDN), which is a network strategy that offers dynamic management and improved performance. However, security threats are a growing concern, particularly with the SDN controller becoming an attractive target for malicious actors and potential Distributed Denial of Service (DDoS) attacks. Many researchers have proposed different approaches to detecting DDoS attacks. However, those approaches suffer from high false positives, leading to low accuracy, and the main reason behind this is the use of non-qualified features and non-realistic datasets. Therefore, the deep learning (DL) algorithmic technique can be utilized to detect DDoS attacks on SDN controllers. Moreover, the proposed approach involves three stages, (1) data preprocessing, (2) cross-feature selection, which aims to identify important features for DDoS detection, and (3) detection using the Recurrent Neural Networks (RNNs) model. A benchmark dataset is employed to evaluate the proposed approach via standard evaluation metrics, including false positive rate and detection accuracy. The findings indicate that the recommended approach effectively detects DDoS attacks with average detection accuracy, average precision, average FPR, and average F1-measure of 94.186 %, 92.146%, 8.114%, and 94.276%, respectively.
The Internet of Things (IoT) has brought significant advancements that have connected our world more closely than ever before. However, the growing number of connected devices has also increased the vulnerability of IoT networks to several types of attacks. In this paper, we present an approach for detecting attacks on IoT networks using a combination of two convolutional neural networks (CNN-CNN). The first CNN model is leveraged to select the significant features that contribute to IoT attack detection from the raw data on network traffic. The second CNN utilizes the features identified by the first CNN to build a robust detection model that accurately detects IoT attacks. The proposed approach is evaluated using the BoT IoT 2020 dataset. The results reveal that the proposed approach achieves 98.04% detection accuracy, 98.09% precision, 99.85% recall, 98.96% recall, and a 1.93% false positive rate (FPR). Furthermore, the proposed approach is compared with other deep learning algorithms and feature selection methods; the results show that it outperforms these algorithms.
Routeing protocol for low-power and lossy networks (RPL) are widely used in dynamic wireless sensor network. Several types of researches worked on RPL and designed hybrid energy-efficient cluster-parent-based RPL, queue utilisation (QU)-RPL, improved RPL, attack detection RPL etc. to support from vulnerable threats, provide efficient routeing and balance dynamic nodes in the network. Previous research findings dealt with certain limitations and problems. In this study, a new coordinative-balanced clustering algorithm is proposed which is enabled to balance destination-oriented directed acyclic graph (DODAG) that is formed in each cluster. Pruning of nodes from DODAG effectively maintains cluster with minimised complexity. This study also resolves the problem of two common security attacks such as distributed denial of service attack (DDoS) and version number attack. Then, enriched-ant colony optimisation is used for DDoS detection and a secure route is chosen to perform data transmission. At the instance of selecting best parent for forwarding data, the authors use residual energy and scoring factor. Scoring factor of each node denotes the legitimacy to be selected as the best parent. Finally, results obtained from Network Simulator 3 indicate better performances on the following metrics: packet delivery ratio, end-to-end delay, node death minimisation, packet loss rate and power consumption.
The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks on these networks. These attacks can have severe consequences, resulting in the unavailability of critical services and financial losses. In this paper, we propose an Intrusion Detection System (IDS) based on a Conditional Tabular Generative Adversarial Network (CTGAN) for detecting DDoS and DoS attacks on IoT networks. Our CGAN-based IDS utilizes a generator network to produce synthetic traffic that mimics legitimate traffic patterns, while the discriminator network learns to differentiate between legitimate and malicious traffic. The syntactic tabular data generated by CTGAN is employed to train multiple shallow machine-learning and deep-learning classifiers, enhancing their detection model performance. The proposed approach is evaluated using the Bot-IoT dataset, measuring detection accuracy, precision, recall, and F1 measure. Our experimental results demonstrate the accurate detection of DDoS and DoS attacks on IoT networks using the proposed approach. Furthermore, the results highlight the significant contribution of CTGAN in improving the performance of detection models in machine learning and deep learning classifiers.
Reversible data hiding (RDH) is crucial in modern data security, ensuring confidentiality and tamper-proofness in various industries like copyright protection, medical imaging, and digital forensics. As technology advances, RDH techniques become essential, but the trade-off between embedding capacity and visual quality must be heeded. In this paper, the relative correlation between the pixel’s local complexity and its directional prediction error is employed to enhance an efficient RDH without using a location map. An embedding process based on multiple cumulative peak region localization (MCPRL) is proposed to hide information in the 3D-directional prediction error histogram with a lower local complexity value and avoid the underflow/overflow problems. The carrier image is divided into three color channels, and then each channel is split into two non-overlapping sets: blank and shadow. Two half-directional prediction errors (the blank set and the shadow set) are constructed to generate a full-directional prediction error for each color channel belonging to the host image. The local complexity value and directional prediction error are critical metrics in the proposed embedding process to improve security and robustness. By utilizing these metrics to construct a 3D stego-Blank Set, the 3D stego-shadow Set will be subsequently constructed using the 3D blank set. The proposed technique outperforms other state-of-the-art techniques in terms of embedding capacity, image quality, and robustness against attacks without an extra location map. The experimental results illustrate the effectiveness of the proposed method for various 3D RDH techniques.
The Hypertext Transfer Protocol (HTTP) is a common target of distributed denial-of-service (DDoS) attacks in today’s cloud computing environment (CCE). However, most existing datasets for Intrusion Detection System (IDS) evaluations are not suitable for CCEs. They are either self-generated or are not representative of CCEs, leading to high false alarm rates when used in real CCEs. Moreover, many datasets are inaccessible due to privacy and copyright issues. Therefore, we propose a publicly available benchmark dataset of HTTP-GET flood DDoS attacks on CCEs based on an actual private CCE. The proposed dataset has two advantages: (1) it uses CCE-based features, and (2) it meets the criteria for trustworthy and valid datasets. These advantages enable reliable IDS evaluations, tuning, and comparisons. Furthermore, the dataset includes both internal and external HTTP-GET flood DDoS attacks on CCEs. This dataset can facilitate research in the field and enhance CCE security against DDoS attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.