skip to main content
10.1145/3389189.3398000acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
short-paper

Neural network architectures for the detection of SYN flood attacks in IoT systems

Published:30 June 2020Publication History

ABSTRACT

We investigate light-weight techniques for detecting common SYN attacks on devices that are attached to the Internet, such as IoT devices and gateways, Fog servers or edge devices which may have low processing capacity. In particular, we examine the Random Neural Network with Deep Learning, trained with "normal" non-attack traffic, and a Long-Short-Term-Memory (LSTM) neural network. Using the same traffic traces for attack traffic, our experiments show that the Random Neural Network provides substantially better attack detection and significantly lower false alarm rates as compared to the LSTM network.

Skip Supplemental Material Section

Supplemental Material

a69-evmorfos.mp4

mp4

16.1 MB

References

  1. E. Gelenbe, "Random neural networks with negative and positive signals and product form solution,"Neural Computation, 1(4), 502--510, 1989.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Gelenbe, "Learning in the recurrent random neural network.," Neural Computation, 5(1), 154--164, 1993Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Gelenbe and Y. Yin, "Deep learning with random neural networks," Neural Networks (IJCNN), 2016 Int. Joint Conference on, IEEE, 1633--1638, 2016.Google ScholarGoogle Scholar
  4. O. Brun, Y. Yin and E. Gelenbe, "Deep Learning with Dense Random Neural Networks for detecting attacks against IoT-connected home Environments," Procedia Computer Science, 134, 458--46 2018. Google ScholarGoogle ScholarCross RefCross Ref
  5. X. Yuan, C. Li and X. Li, "DeepDefense: Identifying DDoS Attack via Deep Learning," 2017 IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, 2017, pp. 1--8. Google ScholarGoogle ScholarCross RefCross Ref
  6. Y. Li and Y. Lu, "LSTM-BA: DDoS Detection Approach Combining LSTM and Bayes," 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD), Suzhou, China, 2019, pp. 180--185. Google ScholarGoogle ScholarCross RefCross Ref
  7. T. Guo, Z. Xu, X. Yao, H. Chen, K. Aberer and K. Funaya, "Robust Online Time Series Prediction with Recurrent Neural Networks," 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, 2016, pp. 816--825.Google ScholarGoogle Scholar
  8. E. Gelenbe, "A Software Defined Self-Aware Network: The Cognitive Packet Network," 2014 IEEE 3rd Symposium on Network Cloud Computing and Applications (ncca 2014), Rome, 2014, pp. 9--14.Google ScholarGoogle Scholar
  9. S. Basterreich and Gerardo Rubino. "Random Neural Network Model for Supervised Learning Problems: A Tutorial," Neural Network World 25.5 (2015): 457--499. Crossref. Web.Google ScholarGoogle ScholarCross RefCross Ref
  10. T. Guo, Z. Xu, X. Yao, H. Chen, K. Aberer and K. Funaya, "Robust Online Time Series Prediction with Recurrent Neural Networks," 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, 2016, pp. 816--825Google ScholarGoogle Scholar
  11. Y. Tian and L. Pan, "Predicting Short-Term Traffic Flow by Long Short-Term Memory Recurrent Neural Network," 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), Chengdu, 2015, pp. 153--158. Google ScholarGoogle ScholarCross RefCross Ref
  12. K. Greff, R. K. Srivastava, J. Koutník, B. R. Steunebrink and J. Schmidhuber, "LSTM: A Search Space Odyssey," in IEEE Transactions on Neural Networks and Learning Systems, vol. 28, no. 10, pp. 2222--2232, Oct. 2017. Google ScholarGoogle ScholarCross RefCross Ref
  13. P. J. Werbos, "Backpropagation through time: what it does and how to do it," in Proceedings of the IEEE, vol. 78, no. 10, pp. 1550--1560, Oct. 1990. Google ScholarGoogle ScholarCross RefCross Ref
  14. H. Tang and J. Glass, "On Training Recurrent Networks with Truncated Backpropagation Through time in Speech Recognition," 2018 IEEE Spoken Language Technology Workshop (SLT), Athens, Greece, 2018, pp. 48--55. Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Kakuru, "Behavior based network traffic analysis tool," 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi'an, 2011, pp. 649--652. Google ScholarGoogle ScholarCross RefCross Ref
  16. W. Zhang et al., "LSTM-Based Analysis of Industrial IoT Equipment," in IEEE Access, vol. 6, pp. 23551--23560, 2018. Google ScholarGoogle ScholarCross RefCross Ref
  17. Z. Zhang, "Improved Adam Optimizer for Deep Neural Networks," 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), Banff, AB, Canada, 2018, pp. 1--2. Google ScholarGoogle ScholarCross RefCross Ref
  18. Lan Wang and E. Gelenbe, "Adaptive dispatching of tasks in the cloud," IEEE Transactions on Cloud Computing 6 (1), 33--45, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  19. Understanding LSTM Networks - colah's blog. https://colah.github.io/posts/2015-08-Understanding-LSTMs/.Google ScholarGoogle Scholar

Index Terms

  1. Neural network architectures for the detection of SYN flood attacks in IoT systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      PETRA '20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments
      June 2020
      574 pages
      ISBN:9781450377737
      DOI:10.1145/3389189

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 June 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader