Abstract
In this paper, a fog-based attack detection framework is proposed, where the DDoS attack is detected using multilayer perceptron deep learning model (MLPDL). The framework consists of a trained MLPDL model installed at the computation module of a fog node that predicts the end IoT device behavior. For selection of best prediction model at the fog layer, we compared the performance of MLPDL model with traditional logistic regression (LR) model using Python Anaconda platform by considering OBS_Network-DataSet_2_Aug27.arff dataset of DDoS attack. From the result, it is found that MLPDL model shows an accuracy of 93.54% and LR model shows an accuracy of 90.32%. Therefore, MLPDL model is used in this framework for predicting the behavior of the end IoT user. Afterward, in the simulation using socket programming, the performance of the proposed framework is evaluated using prediction accuracy and prediction computation time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Samy A, Yu H, Zhang H (2020) Fog-based attack detection framework for internet of things using deep learning. IEEE Access 8:74571–74585
Lawal MA, Shaikh RA, Hassan SR (2020) An anomaly mitigation framework for iot using fog computing. Electronics 9(10):1565
Puthal D et al (2019) Fog computing security challenges and future directions [energy and security]. In: IEEE consumer electronics magazine 8(3):92–96
Nath SB et al (2018) A survey of fog computing and communication: current researches and future directions. arXiv preprint arXiv:1804.04365
Sudqi Khater B et al (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178
Granjal J, Monteiro E, Silva JS (2015) Security for the Internet of Things: a survey of existing protocols and open research issues. Commun Surv Tuts 17(3):1294–1312
Douligeris C, Mitrokotsa A (2003) DDoS attacks and defense mechanisms: a classification. In: Proceedings of the 3rd IEEE international symposium on signal processing and information technology (IEEE Cat. No. 03EX795). IEEE
Bhushan K (2017) DDoS attack defense framework for cloud using fog computing. 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT). IEEE
Priyadarshini R, Barik RK (2019) A deep learning based intelligent framework to mitigate DDoS attack in fog environment. J King Saud Univ Comput Inform Sci
Chaudhary D, Bhushan K, Gupta BB (2018) Survey on DDoS attacks and defense mechanisms in cloud and fog computing. Int J E-Serv Mobile Appl (IJESMA) 10(3):61–83
Potluri S et al (2020) Detection and prevention mechanisms for DDoS attack in cloud computing environment. In: 2020 11th international conference on computing, communication and networking technologies (ICCCNT). IEEE
Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. Plos One 11(6):1–17, 06. [Online]. Available: https://doi.org/10.1371/journal.pone.0155781
Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. CoRR, vol. abs/1709.08025, [Online]. Available: http://arxiv.org/abs/1709.08025
Vinayakumar R, Soman KP, Poornachandran P (2017) Deep android malware detection and classification. In: 2017 international conference on advances in computing, communications, and informatics (ICACCI), pp 1677–1683
Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961
McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupé A, Joon Ahn G (2017) Deep android malware detection. In: Proceedings of the seventh ACM on conference on data and application security and privacy, ser. CODASPY ’17. New York, NY, USA: ACM, pp 301–308. [Online]. Available: https://doi.org/10.1145/3029806.3029823
Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 6:303–336
Tewari A, Gupta BB (2018) Security, privacy and trust of different layers in Internet-of- Things (IoTs) framework. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.04.027
Lashkari AH, Draper-Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time-based features. In: ICISSP
Kousaridas A, Falangitis S, Magdalinos P, Alonistioti N, Dillinger M (2015) Systas: Density-based algorithm for clusters discovery in wireless networks. In: 2015 IEEE 26th annual international symposium on personal, indoor, and mobile radio communications (PIMRC), Aug 2015, pp 2126–2131
Deshmukh RV, Devadkar KK (2015) Understanding DDoS attack & its effect in cloud environment. Procedia Comput Sci 49:202–210
Rajab A et al (2016) Countering burst header packet flooding attack in optical burst switching network. In: International conference on information security practice and experience. Springer, Cham
Sahoo KS et al (2019) Toward secure software-defined networks against distributed denial of service attack. J Supercomputing 75(8):829–4874
Saha M, Panda SK, Panigrahi S (2019) Distributed computing security: issues and challenges. Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies 129–138
Rout JK, Bhoi SK, Panda SK (2014) Sftp: a secure and fault-tolerant paradigm against blackhole attack in manet. arXiv preprint arXiv:1403.0338
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Conflict of Interest
There is no conflict of interest.
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gudla, S.P.K., Bhoi, S.K. (2022). MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing. In: Rout, R.R., Ghosh, S.K., Jana, P.K., Tripathy, A.K., Sahoo, J.P., Li, KC. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 427. Springer, Singapore. https://doi.org/10.1007/978-981-19-1018-0_3
Download citation
DOI: https://doi.org/10.1007/978-981-19-1018-0_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1017-3
Online ISBN: 978-981-19-1018-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)