| Literature DB >> 35062372 |
Muhammad Altaf Khan1, Moustafa M Nasralla2, Muhammad Muneer Umar1, Shafiullah Khan1, Nikumani Choudhury3.
Abstract
Wireless sensor networks (WSNs) are low-cost, special-purpose networks introduced to resolve various daily life domestic, industrial, and strategic problems. These networks are deployed in such places where the repairments, in most cases, become difficult. The nodes in WSNs, due to their vulnerable nature, are always prone to various potential threats. The deployed environment of WSNs is noncentral, unattended, and administrativeless; therefore, malicious attacks such as distributed denial of service (DDoS) attacks can easily be commenced by the attackers. Most of the DDoS detection systems rely on the analysis of the flow of traffic, ultimately with a conclusion that high traffic may be due to the DDoS attack. On the other hand, legitimate users may produce a larger amount of traffic known, as the flash crowd (FC). Both DDOS and FC are considered abnormal traffic in communication networks. The detection of such abnormal traffic and then separation of DDoS attacks from FC is also a focused challenge. This paper introduces a novel mechanism based on a Bayesian model to detect abnormal data traffic and discriminate DDoS attacks from FC in it. The simulation results prove the effectiveness of the proposed mechanism, compared with the existing systems.Entities:
Keywords: Bayesian model; DDoS; WSNs; flash crowd; security
Mesh:
Year: 2022 PMID: 35062372 PMCID: PMC8777834 DOI: 10.3390/s22020410
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Summary of related articles.
| Article | Details |
|---|---|
| Katiyar et al. [ | Parameters: IP and Port addresses of Source & Destination |
| Yu. et al. [ | Parameters: Source IPs distribution, access intent, traffic rate |
| Bathia et al. [ | Parameters:Variation in the source addresses and traffic rate, packets scattering among source addresses |
| S.Renukadevi et al. [ | Parameters: Flow similarity, client legitimacy, page referred |
| J. Gera et al. [ | Parameters: Source entropy & traffic entropy |
| K. S. Sahoo et al. [ | Parameters: Source & destination IPs, source & destination port |
| S. Daneshgadeh et al. [ | Parameters: Time interval, source/destination IPs |
| Wang et al. 2017 [ | Parameters: Structural, such as temperature, humidity, light intensity, and voltage; Validation technique: Simulation; Dataset: IBRL dataset with manual entries; Target: Detection of abnormal structural events |
| Reddy and Thilagam, 2020 [ | Parameters: Packet size, port number, source address, destination address, and jitter; Validation Technique: Simulation; Dataset: None; Target: DDoS detection and mitigation |
Figure 1The proposed system model.
Figure 2The overall structure of the proposed model.
Parameters for experimental simulation.
| Parameter | Values |
|---|---|
| Simulator | NS-2.33 |
| Duration of Simulation | 60 s |
| Nodes’ Transmission range | 250 m |
| Network Area | 1000 × 1000 m |
| Base Protocol | AODV |
| Number of Nodes | 100–200 |
| Nodes’ Distribution | Random |
| Traffic source | CBR |
| Maximum speed of node | 10 m per second |
| Packet Size | Random |
| Nodes’ Pause Times | 10 to 60 s |
Comparison of traffic.
| Traffic Type | Number of Packets per Second | |||||
|---|---|---|---|---|---|---|
| Time (s) | 10 | 20 | 30 | 40 | 50 | 60 |
| Normal | 24 | 26 | 32 | 34 | 36 | 38 |
| Abnormal | 37 | 38 | 48 | 58 | 64 | 64 |
Figure 3Experiment 1 for categorization of traffic.
DDoS attack versus FC based on IAT.
| Traffic Type | Interarrival Time | |||||||
|---|---|---|---|---|---|---|---|---|
| Received Packets | 200 | 400 | 600 | 800 | 1000 | 1200 | 1400 | 1600 |
| DDoS | 0.00743 | 0.01135 | 0.01283 | 0.01600 | 0.01010 | 0.00643 | 0.01923 | 0.00889 |
| FC | 0.02215 | 0.05002 | 0.05999 | 0.03656 | 0.07009 | 0.04996 | 0.03533 | 0.02778 |
DDoS attack from FC based on the size of payload.
| Traffic Type | Payload Size (Bytes) | |||||||
|---|---|---|---|---|---|---|---|---|
| Received Packets | 200 | 400 | 600 | 800 | 1000 | 1200 | 1400 | 1600 |
| DDoS | 512 | 512 | 512 | 480 | 480 | 490 | 490 | 490 |
| FC | 512 | 460 | 440 | 480 | 530 | 510 | 512 | 460 |
Figure 4Discrimination of DDoS attack from FC based on IAT.
Figure 5Discrimination of DDoS attack from FC based on the size of payload.
DDoS and FC traffic classification.
| Type | IPs |
|
|
|
|
|---|---|---|---|---|---|
| FC | 14 | 18.1818 | 0.0285 | 490.33 | 0.0472 |
| DDoS | 6 | 10.0484 | 0.00780 | 500.83 | 0.00742 |
Figure 6Experiment 2 for categorization of traffic.
Parameters calculated for attack and FC.
| Type | IPs |
|
|
|
|
|---|---|---|---|---|---|
| FC | 15 | 23.214 | 0.02973 | 483.33 | 0.037 |
| DDoS | 10 | 5.0484 | 0.00130 | 503.12 | 0.00432 |
Figure 7Discrimination of DDoS attack from FC based on IAT.
Figure 8Discrimination based on the size of payload.
Parameters calculated for DDoS attack and FC traffic.
| Type | IPs |
|
|
|
|
|---|---|---|---|---|---|
| FIFA World Cup | 8106 | 6130.3 | 0.3498 | 10,055.1 | 27.8181 |
| CAIDA DDoS | 5556 | 0.90 | 0.001123 | 60.8 | 0.0048 |
Figure 9Discrimination of DDoS attack from FC based on IAT.
Figure 10Discrimination of DDoS attack from FC based on the size of payload.
Figure 11Attack intensity vs. false-positive rates.
Figure 12Attack intensity vs. false-negative rates.
Figure 13Attack intensity vs. detection accuracy.