Skip to main content

MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing

  • Conference paper
  • First Online:
Advances in Distributed Computing and Machine Learning

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 427))

Abstract

In this paper, a fog-based attack detection framework is proposed, where the DDoS attack is detected using multilayer perceptron deep learning model (MLPDL). The framework consists of a trained MLPDL model installed at the computation module of a fog node that predicts the end IoT device behavior. For selection of best prediction model at the fog layer, we compared the performance of MLPDL model with traditional logistic regression (LR) model using Python Anaconda platform by considering OBS_Network-DataSet_2_Aug27.arff dataset of DDoS attack. From the result, it is found that MLPDL model shows an accuracy of 93.54% and LR model shows an accuracy of 90.32%. Therefore, MLPDL model is used in this framework for predicting the behavior of the end IoT user. Afterward, in the simulation using socket programming, the performance of the proposed framework is evaluated using prediction accuracy and prediction computation time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Samy A, Yu H, Zhang H (2020) Fog-based attack detection framework for internet of things using deep learning. IEEE Access 8:74571–74585

    Google Scholar 

  2. Lawal MA, Shaikh RA, Hassan SR (2020) An anomaly mitigation framework for iot using fog computing. Electronics 9(10):1565

    Google Scholar 

  3. Puthal D et al (2019) Fog computing security challenges and future directions [energy and security]. In: IEEE consumer electronics magazine 8(3):92–96

    Google Scholar 

  4. Nath SB et al (2018) A survey of fog computing and communication: current researches and future directions. arXiv preprint arXiv:1804.04365

  5. Sudqi Khater B et al (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178

    Google Scholar 

  6. Granjal J, Monteiro E, Silva JS (2015) Security for the Internet of Things: a survey of existing protocols and open research issues. Commun Surv Tuts 17(3):1294–1312

    Article  Google Scholar 

  7. Douligeris C, Mitrokotsa A (2003) DDoS attacks and defense mechanisms: a classification. In: Proceedings of the 3rd IEEE international symposium on signal processing and information technology (IEEE Cat. No. 03EX795). IEEE

    Google Scholar 

  8. Bhushan K (2017) DDoS attack defense framework for cloud using fog computing. 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT). IEEE

    Google Scholar 

  9. Priyadarshini R, Barik RK (2019) A deep learning based intelligent framework to mitigate DDoS attack in fog environment. J King Saud Univ Comput Inform Sci

    Google Scholar 

  10. Chaudhary D, Bhushan K, Gupta BB (2018) Survey on DDoS attacks and defense mechanisms in cloud and fog computing. Int J E-Serv Mobile Appl (IJESMA) 10(3):61–83

    Article  Google Scholar 

  11. Potluri S et al (2020) Detection and prevention mechanisms for DDoS attack in cloud computing environment. In: 2020 11th international conference on computing, communication and networking technologies (ICCCNT). IEEE

    Google Scholar 

  12. Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. Plos One 11(6):1–17, 06. [Online]. Available: https://doi.org/10.1371/journal.pone.0155781

  13. Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. CoRR, vol. abs/1709.08025, [Online]. Available: http://arxiv.org/abs/1709.08025

  14. Vinayakumar R, Soman KP, Poornachandran P (2017) Deep android malware detection and classification. In: 2017 international conference on advances in computing, communications, and informatics (ICACCI), pp 1677–1683

    Google Scholar 

  15. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961

    Google Scholar 

  16. McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupé A, Joon Ahn G (2017) Deep android malware detection. In: Proceedings of the seventh ACM on conference on data and application security and privacy, ser. CODASPY ’17. New York, NY, USA: ACM, pp 301–308. [Online]. Available: https://doi.org/10.1145/3029806.3029823

  17. Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 6:303–336

    Article  Google Scholar 

  18. Tewari A, Gupta BB (2018) Security, privacy and trust of different layers in Internet-of- Things (IoTs) framework. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.04.027

    Article  Google Scholar 

  19. Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time-based features. In: ICISSP

    Google Scholar 

  20. Kousaridas A, Falangitis S, Magdalinos P, Alonistioti N, Dillinger M (2015) Systas: Density-based algorithm for clusters discovery in wireless networks. In: 2015 IEEE 26th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), Aug 2015, pp 2126–2131

    Google Scholar 

  21. Deshmukh RV, Devadkar KK (2015) Understanding DDoS attack & its effect in cloud environment. Procedia Comput Sci 49:202–210

    Google Scholar 

  22. Rajab A et al (2016) Countering burst header packet flooding attack in optical burst switching network. In: International conference on information security practice and experience. Springer, Cham

    Google Scholar 

  23. Sahoo KS et al (2019) Toward secure software-defined networks against distributed denial of service attack. J Supercomputing 75(8):829–4874

    Google Scholar 

  24. Saha M, Panda SK, Panigrahi S (2019) Distributed computing security: issues and challenges. Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies 129–138

    Google Scholar 

  25. Rout JK, Bhoi SK, Panda SK (2014) Sftp: a secure and fault-tolerant paradigm against blackhole attack in manet. arXiv preprint arXiv:1403.0338

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sourav Kumar Bhoi .

Editor information

Editors and Affiliations

Ethics declarations

Conflict of Interest

There is no conflict of interest.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gudla, S.P.K., Bhoi, S.K. (2022). MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing. In: Rout, R.R., Ghosh, S.K., Jana, P.K., Tripathy, A.K., Sahoo, J.P., Li, KC. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 427. Springer, Singapore. https://doi.org/10.1007/978-981-19-1018-0_3

Download citation

Publish with us

Policies and ethics