Log in

Timely detection of DDoS attacks in IoT with dimensionality reduction

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The exponential growth of IoT devices and their interdependency makes the technology more vulnerable to network attacks like Distributed Denial of Service (DDoS) that interrupt network resources. The prevalence of these attacks necessitates the development of robust and effective defense mechanisms. In recent years, many machine learning defense methodologies have been developed to address the ubiquitous growth of DDoS attacks on IoT, and the majority of them suffer from detection time delay issues. Thus, the paper presents an approach focusing on dimensionality reduction and feature selection techniques to minimize long-time detection without compromising accuracy. The proposed approach uses Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Factor Analysis and Recursive Feature Elimination with Cross Validation (RFECV) as the dimensionality reduction and feature selection techniques and Gaussian Naïve Bayes (GNB), Decision Tree (DT), Random Forest (RF), AdaBoost, and Logistic Regression (LR) as machine learning models to classify the malicious traffic. The approach provides a reliable DDoS detection model that effectively enhances the detection time delay with the combination of GNB with LDA and achieves 99.98% accuracy in 0.582 s of detection time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Algorithm 2
Fig. 6
Algorithm 3
Fig. 7
Algorithm 4
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

The CICDDoS2019 dataset is used in this work for validating the proposed approach which is available at: “https://www.unb.ca/cic/datasets/ddos-2019.html”.

References

  1. Selvarajan, S., Srivastava, G., Khadidos, A.O., Khadidos, A.O., Baza, M., Alshehri, A., Lin, J.C.-W.: An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud Comput. 12(38), 1–17 (2023)

    Google Scholar 

  2. Al-Fawa’reh, M., Al-Fayoumi, M., Nashwan, S., Fraihat, S.: Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior. Egypt. Inform. J. 23(2), 173–185 (2022)

    Article  Google Scholar 

  3. Kasturi, A., Agrawal, A., Hota, C.: Secure peer-to-peer learning using feature embeddings. Clust. Comput. (2023). https://doi.org/10.1007/s10586-023-04155-y

    Article  Google Scholar 

  4. Nguyen, K.V., Nguyen, H.T., Le, T.Q., Truong, Q.N.M.: Abnormal network packets identification using header information collected from Honeywall architecture. J. Inf. Telecommun. (2023). https://doi.org/10.1080/24751839.2023.2215135

    Article  Google Scholar 

  5. Gueye, T., Wang, Y., Rehman, M., Mushtaq, R.T., Zahoor, S.: A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning. Clust. Comput. 26, 2947–2973 (2023)

    Article  Google Scholar 

  6. Shitharth, S., Mohammed, G.B., Ramasamy, J., Srivel, R.: Intelligent intrusion detection algorithm based on multi-attack for edge-assisted Internet of Things. In: Security and Risk Analysis for Intelligent Edge Computing, Advances in Information Security (ADIS), vol. 103, pp. 119–135. Springer, Cham (2023)

  7. Zagrouba, R., Alhajri, R.M.: Machine learning based attacks detection and countermeasures in IoT. Int. J. Commun. Netw. Inf. Secur. 13(2), 158–167 (2021)

    Google Scholar 

  8. Zhao, K., Lu, B., Shi, H., Ren, G., Zhang, Y.: A DDoS attack detection and defense mechanism based on the self-organizing map** in SDN. Internet Technol. Lett. e305, 1–6 (2021)

    Google Scholar 

  9. Kumari, P., Jain, A.K.: A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput. Secur. 127(103096), 1–23 (2023)

    Google Scholar 

  10. Salim, M.M., Rathore, S., Park, J.H.: Distributed denial of service attacks and its defenses in IoT: a survey. J. Supercomput. 2020(76), 5320–5363 (2020)

    Article  Google Scholar 

  11. Khadidos, A.O., Shitharth, S., Khadidos, A.O., Sangeetha, K., Alyoubi, K.H.: Healthcare data security using IoT sensors based on random hashing mechanism. J. Sens. 2022(8457116), 1–17 (2022)

    Article  Google Scholar 

  12. Gopi, R., Selvakumar, S., Sathiyamoorthi, V., Manikandan, R., Chatterjee, P., Jhanjhi, N.Z., Luhach, A.K.: Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimed. Tools Appl. (2021). https://doi.org/10.1007/s11042-021-10640-6

    Article  Google Scholar 

  13. Padmaja, M., Shitharth, S., Prasuna, K., Chaturvedi, A., Kshirsagar, P.R., Vani, A.: Grow of artifcial intelligence to challenge security in IoT application. Wirel. Pers. Commun. 127, 1829–1845 (2022)

    Article  Google Scholar 

  14. Anand, P., Singh, Y., Selwal, A., Singh, P.K., Felseghi, R.A., Raboaca, M.S.: IoVT: Internet of Vulnerable Things? Threat architecture, attack surfaces, and vulnerabilities in Internet of Things and its applications towards smart grids. Energies 13(4813), 1–23 (2020)

    Google Scholar 

  15. Aamir, M., Zaidi, M.A.: A survey on DDoS attack and defense strategies: from traditional schemes to current techniques. Interdiscip. Inf. Sci. 19(2), 173–200 (2013)

    Google Scholar 

  16. Gaurav, A., Gupta, B.B., Panigrahi, P.K.: A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs. Technol. Forecast. Soc. Change 177(121554), 1–11 (2022)

    Google Scholar 

  17. Patil, N.V., Krishna, C.R., Kumar, K.: SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. Clust. Comput. 25, 1355–1372 (2022)

    Article  Google Scholar 

  18. Mummadi, A., Yadav, B.M.K., Sadhwika, R., Shitharth, S.: An appraisal of cyber-attacks and countermeasures using machine learning algorithms. In: ICAIDS 2021: Artificial Intelligence and Data Science, Communications in Computer and Information Science (2022)

  19. Kamaldeep, Malik, M., Dutta, M.: Feature engineering and machine learning framework for DDoS attack detection in the standardized Internet of Things. IEEE Internet Things J. 10(10), 8658–8669 (2023)

    Article  Google Scholar 

  20. Kebede, S.D., Tiwari, B., Tiwari, V., Chandravanshi, K.: Predictive machine learning-based integrated approach for DDoS detection and prevention. Multimed. Tools Appl. 81(3), 4185–4211 (2022)

    Article  Google Scholar 

  21. Sanchez, O.R., Repetto, M., Carrega, A., Bolla, R.: Evaluating ML-based DDoS detection with grid search hyperparameter optimization. In: 2021 IEEE 7th International Conference on Network Softwarization (NetSoft) (2021)

  22. Taylor, O.E., Ezekiel, P.S.: A smart system for detecting behavioural botnet attacks using random forest classifier with principal component analysis. Eur. J. Artif. Intell. Mach. Learn. 1(2), 11–16 (2022)

    Article  Google Scholar 

  23. Zheng, D., Hong, Z., Wang, N., Chen, P.: An improved LDA-based ELM classification for intrusion detection algorithm in IoT application. Sensors 20(1706), 1–19 (2020)

    Google Scholar 

  24. Babu, D.: Factor Analysis-My ML Oreo Detector. 19 October 2020. [Online]. https://towardsdatascience.com/factor-analysis-my-ml-oreo-detector-2e02abc2bb30#. Accessed 12 June 2022

  25. Kim, Y.-E., Kim, Y.-S., Kim, H.: Effective feature selection methods to detect IoT DDoS attack in 5G core network. Sensors 22(10), 3819 (2022)

    Article  Google Scholar 

  26. Sangodoyin, A.O., Akinsolu, M.O., Pillai, P., Grout, V.: Detection and classification of DDoS flooding attacks on software-defined networks: a case study for the application of machine learning. IEEE Access 9, 122495–122508 (2021)

    Article  Google Scholar 

  27. Machaka, P., Ajayi, O., Maluleke, H., Kahenga, F., Bagula, A., Kyamakya, K.: Modelling DDoS attacks in IoT networks using machine. ar** realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India (2019)

  28. Kshirsagar, D., Kumar, S.: A feature reduction based reflected and exploited DDoS attacks detection system. J. Ambient Intell. Humaniz. Comput. 13(1), 393–405 (2022)

    Article  Google Scholar 

  29. Saheed, Y.K.: Performance improvement of intrusion detection system for detecting attacks on Internet of Things and Edge of Things. In: Artificial Intelligence for Cloud and Edge Computing, pp. 321–339 (2022)

  30. Abbas, S.A., Almhanna, M.S.: Distributed denial of service attacks detection system by machine learning based on dimensionality reduction. J. Phys.: Conf. Ser. 1804(1), 012136 (2021)

    Google Scholar 

  31. Popoola, S.I., Adebisi, B., Hammoudeh, M., Gui, G., Gacanin, H.: Hybrid deep learning for botnet attack detection in the Internet-of-Things networks. IEEE Internet Things J. 8(6), 4944–4956 (2021)

    Article  Google Scholar 

  32. Ali, J., Roh, B.-h., Lee, B., Oh, J., Adil, M.: A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of big data. In: 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (2020)

  33. Ashi, Z., Aburashed, L., Al-Fawa’reh, M., Qasaimeh, M.: Fast and reliable DDoS detection using dimensionality reduction and machine learning. In: 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK (2020)

  34. Salo, F., Nassif, A.B., Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 148, 164–175 (2019)

    Article  Google Scholar 

  35. Batchu, R.K., Seetha, H.: A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning. Comput. Netw. 200(108498), 1389–1286 (2021)

    Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

Pooja Kumari has implemented this study and wrote the manuscript. Dr. Ankit Kumar Jain has provided his guidance to conduct the study and helped in writing the manuscript. All authors reviewed the manuscript.

Corresponding author

Correspondence to Pooja Kumari.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumari, P., Jain, A.K. Timely detection of DDoS attacks in IoT with dimensionality reduction. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04392-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04392-9

Keywords

Navigation