Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
<p>Internet of Vehicles (IoV) illustrating various communication types.</p> "> Figure 2
<p>IoV network attack detection system.</p> "> Figure 3
<p>Selected important features.</p> "> Figure 4
<p>Distribution of different attack types in the dataset.</p> "> Figure 5
<p>Federated learning and machine learning process flow.</p> "> Figure 6
<p>ROC Curves for Decision Tree, Random Forest, XGBoost, Gradient Boosting, and K-Nearest Neighbors models; comparing classification performance across multiple classes: (<b>a</b>) ROC Curve for Decision Tree Model. (<b>b</b>) ROC Curve for Random Forest Model. (<b>c</b>) ROC Curve for XGBoost Model. (<b>d</b>) ROC Curve for Gradient Boosting Model. (<b>e</b>) ROC Curve for K-Nearest Neighbors Model.</p> "> Figure 7
<p>Confusion matrices for Model (<b>a</b>), Model (<b>b</b>), Model (<b>c</b>), Model (<b>d</b>), and Model (<b>e</b>): (<b>a</b>) Confusion Matrix for Decision Tree Model. (<b>b</b>) Confusion Matrix for Random Forest Model. (<b>c</b>) Confusion Matrix for XGBoost Model. (<b>d</b>) Confusion Matrix for Gradient Boosting Model. (<b>e</b>) Confusion Matrix for K-Nearest Neighbors Model. In each confusion matrix, color intensity shows prediction frequency, with darker shades indicating higher values and lighter shades showing lower values, helping to spot misclassifications.</p> "> Figure 8
<p>Running time of models under different scenarios.</p> "> Figure 9
<p>Memory usage of models under different scenarios.</p> ">
Abstract
:1. Introduction
- Develop an effective feature selection method that uses the Gini index to determine which features are most important for detecting DDoS attacks.
- Implement Federated Learning to enable privacy-preserving, scalable, and adaptive model training in IoV environments.
- Evaluate the performance of the suggested approach in terms of accuracy, privacy preservation, and computational efficiency.
- Compare the effectiveness of the proposed method against traditional centralized methods and other machine learning approaches to highlight the improvements in detection capabilities and operational efficiency.
2. Literature Review
3. Methodology
3.1. Dataset Description
- Data Preprocessing: First, we cleaned the dataset for model training, handled missing values, and transformed categorical variables. Mean imputation was applied to numerical features, while mode imputation was performed on categorical features. One-hot encoding was used for features with a small number of categories, whereas features with a high number of categories were encoded using a label encoder to ensure the data were complete and ready for training.
- Feature Importance Calculation: We used a Random Forest classifier to calculate the Gini importance scores of all features. Random Forest creates many decision trees and then averages their results for better accuracy and to avoid fitting.
- Feature Selection: We picked the top 25 features with the highest Gini importance score, reducing model complexity and retaining only those that are informative.The following formula is used to obtain the Gini index for a feature X:
3.2. Machine Learning Models
3.2.1. Decision Tree
3.2.2. Random Forest
3.2.3. XGBoost Classifier
3.2.4. Gradient Boosting
3.2.5. KNeighborsClassifier
3.3. Federated Learning Approach
- Initialization:
- Start with a global model .
- Local Training:
- Each device i trains the model on its local data :
For local model training, the distribution of data samples among three clients can significantly impact the convergence rate and the model’s generalization ability. Each client receives an equal number of samples, totaling 20,136 per client. This balanced distribution ensures that each client has an identical amount of data for training and evaluation purposes in the federated learning setup. - Model Aggregation:
- Aggregate local model updates using Federated Averaging (FedAvg):
- Iteration:
- Repeat steps 2 and 3 until convergence criteria are met.
4. Experiments and Results
4.1. Experimental Setup
- Accuracy: Ratio of the number of correctly classified instances to the number of instances in total.
- Precision: Proportion of true positive predictions out of the total number of positive predictions.
- Recall: Proportion of true positive predictions out of the total number of positive instances.
- F1-score: A number that considers both precision and recall as if they were orthogonal.
- Classification Report: Helps derive model evaluation metrics such as precision, recall, F1-score, exhorting all have support (the number of occurrences of actual class) for each model.
4.2. Hyperparameter Tuning
4.3. Evaluation
5. Discussion
5.1. Benefits and Challenges of Federated Learning
5.2. Comparative Analysis and Achievements
5.3. Implications for Real-World Applications
- Improved DDoS Detection: Research has shown that the use of newer machine learning modules together with feature selection techniques is beneficial in handling DDoS detection and mitigation tasks. This upholds the reliability and security of Internet of Vehicles systems, which are important for autonomous vehicles and smart transport systems.
- Complexity and Reduction: The application of feature selection through the Gini Index is not only instrumental in increasing the detection accuracy, but it also helps cut down on the computation burden that is placed on the models. This is critical as adopting an approach that narrows down features, which are most relevant to the processing of IoV devices and are usually resource-constrained, can be lightened. Such simplification of models is important in the real-time detection of DDoS attacks as it increases the response time and helps in the better allocation of resources in the IoV setup.
- Privacy-Preserving Solutions: Federated Learning offers a viable solution for IoV networks to leverage collaborative learning while maintaining data privacy. This is especially relevant for applications involving sensitive information, such as autonomous vehicles and smart transportation systems. By ensuring data privacy, Federated Learning can increase user trust and acceptance of IoV technologies.
- Scalability and Adaptability: The scalability of Federated Learning makes it suitable for widespread IoV deployment, accommodating a large number of devices with varying capabilities. This adaptability ensures that security solutions remain effective as the IoV ecosystem evolves. Furthermore, Federated Learning can adapt to new and emerging threats, providing a robust defense mechanism for future IoV networks.The practical effectiveness of our method is evidenced by its ability to accurately detect different types of DDoS attacks. Notably, our models achieved detection rates of 28.65% for DrDoS_DNS, 28.94% for DrDoS_SNMP, 9.20% for DrDoS_UDP, and 20.61% for NetBIOS attacks. These findings illustrate the robustness of our approach in real-world scenarios where a variety of attack types are encountered.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Abbreviation | Full Form |
IoV | Internet of Vehicles |
DDoS | Distributed Denial of Service |
IDS | Intrusion Detection System |
V2V | Vehicle-to-Vehicle |
V2I | Vehicle-to-Infrastructure |
IOT | Internet of Things |
IIOT | Industrial Internet of Things |
FL | Federated Learning |
Gini | Gini Index |
ML | Machine Learning |
RF | Random Forest |
KNN | K-Nearest Neighbors |
XGBoost | eXtreme Gradient Boosting |
ROC | Receiver Operating Characteristic |
AUC | Area Under the Curve |
SVM | Support Vector Machine |
References
- Szymonik, A. Cybersecurity of autonomous vehicles–threats and mitigation. Sci. J. Mil. Univ. Land Forces 2024, 56, 77–96. [Google Scholar] [CrossRef]
- Verma, A.; Saha, R.; Kumar, G.; Conti, M.; Rodrigues, J.J. VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 2024, 48, 100787. [Google Scholar] [CrossRef]
- Albishi, O.A.; Abdullah, M. DDoS Attacks Detection in IoV using ML-based Models with an Enhanced Feature Selection Technique. Int. J. Adv. Comput. Sci. Appl. 2024, 15. [Google Scholar] [CrossRef]
- Taslimasa, H.; Dadkhah, S.; Neto, E.C.P.; Xiong, P.; Ray, S.; Ghorbani, A.A. Security issues in Internet of Vehicles (IoV): A comprehensive survey. Internet Things 2023, 22, 100809. [Google Scholar] [CrossRef]
- Mengistu, T.M.; Kim, T.; Lin, J.W. A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation in the Integration of IoT, Wireless Sensor Networks and Federated Learning. Sensors 2024, 24, 968. [Google Scholar] [CrossRef] [PubMed]
- Doriguzzi-Corin, R.; Siracusa, D. FLAD: Adaptive federated learning for DDoS attack detection. Comput. Secur. 2024, 137, 103597. [Google Scholar] [CrossRef]
- Haddaji, A.; Ayed, S.; Chaari Fourati, L. IoV security and privacy survey: Issues, countermeasures, and challenges. J. Supercomput. 2024, 80, 23018–23082. [Google Scholar] [CrossRef]
- Chanu, U.S.; Singh, K.J.; Chanu, Y.J. A dynamic feature selection technique to detect DDoS attack. J. Inf. Secur. Appl. 2023, 74, 103445. [Google Scholar] [CrossRef]
- Shaar, F.; Efe, A. DDoS attacks and impacts on various cloud computing components. Int. J. Inf. Secur. Sci. 2018, 7, 26–48. [Google Scholar]
- Dibaei, M.; Zheng, X.; Jiang, K.; Abbas, R.; Liu, S.; Zhang, Y.; Xiang, Y.; Yu, S. Attacks and defences on intelligent connected vehicles: A survey. Digit. Commun. Netw. 2020, 6, 399–421. [Google Scholar] [CrossRef]
- Carlos Pinto Neto, E.; Taslimasa, H.; Dadkhah, S.; Iqbal, S.; Xiong, P.; Rahman, T.; Ghorbani, A. Ciciov2024: Advancing Realistic Ids Approaches Against Dos and Spoofing Attack in Iov Can Bus. Internet Things 2024, 26, 101209. [Google Scholar] [CrossRef]
- Ramya Devi, M.; Lokesh, S. Intelligent accident detection system by emergency response and disaster management using vehicular fog computing. Automatika 2024, 65, 117–129. [Google Scholar] [CrossRef]
- Sadaf, M.; Iqbal, Z.; Anwar, Z.; Noor, U.; Imran, M.; Gadekallu, T.R. A novel framework for detection and prevention of denial of service attacks on autonomous vehicles using fuzzy logic. Veh. Commun. 2024, 46, 100741. [Google Scholar] [CrossRef]
- Hassan, M.; Tariq, N.; Alsirhani, A.; Alomari, A.; Khan, F.A.; Alshahrani, M.M.; Ashraf, M.; Humayun, M. Gitm: A gini index-based trust mechanism to mitigate and isolate sybil attack in rpl-enabled smart grid advanced metering infrastructures. IEEE Access 2023, 11, 62697–62720. [Google Scholar] [CrossRef]
- Singh, J.; Behal, S. Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions. Comput. Sci. Rev. 2020, 37, 100279. [Google Scholar] [CrossRef]
- Manivannan, D.; Moni, S.S.; Zeadally, S. Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 2020, 25, 100247. [Google Scholar] [CrossRef]
- Sherazi, H.H.R.; Iqbal, R.; Ahmad, F.; Khan, Z.A.; Chaudary, M.H. DDoS attack detection: A key enabler for sustainable communication in internet of vehicles. Sustain. Comput. Inform. Syst. 2019, 23, 13–20. [Google Scholar] [CrossRef]
- Alalwany, E.; Mahgoub, I. Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions. Sensors 2024, 24, 368. [Google Scholar] [CrossRef] [PubMed]
- Gaurav, A.; Gupta, B.B.; Peñalvo, F.J.G.; Nedjah, N.; Psannis, K. Ddos attack detection in vehicular ad-hoc network (vanet) for 5g networks. In Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions; Springer: Cham, Switzerland, 2022; pp. 263–278. [Google Scholar]
- Goncalves, F.; Ribeiro, B.; Gama, O.; Santos, J.; Costa, A.; Dias, B.; Nicolau, M.J.; Macedo, J.; Santos, A. Synthesizing datasets with security threats for vehicular ad-hoc networks. In Proceedings of the GLOBECOM 2020–2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; IEEE: New York, NY, USA, 2020; pp. 1–6. [Google Scholar]
- Gruebler, A.; McDonald-Maier, K.D.; Alheeti, K.M.A. An intrusion detection system against black hole attacks on the communication network of self-driving cars. In Proceedings of the 2015 Sixth International Conference on Emerging Security Technologies (EST), Braunschweig, Germany, 3–5 September 2015; IEEE: New York, NY, USA, 2015; pp. 86–91. [Google Scholar]
- Rani, P.; Sharma, C.; Ramesh, J.V.N.; Verma, S.; Sharma, R.; Alkhayyat, A.; Kumar, S. Federated learning-based misbehaviour detection for the 5G-enabled internet of vehicles. IEEE Trans. Consum. Electron. 2023, 70, 4656–4664. [Google Scholar] [CrossRef]
- Gou, W.; Zhang, H.; Zhang, R. Multi-classification and tree-based ensemble network for the intrusion detection system in the internet of vehicles. Sensors 2023, 23, 8788. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 2022, 10, 40281–40306. [Google Scholar] [CrossRef]
- Li, J.; Zhang, Z.; Li, Y.; Guo, X.; Li, H. FIDS: Detecting DDoS through federated learning based method. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021; IEEE: New York, NY, USA, 2021; pp. 856–862. [Google Scholar]
- Hamza, N.; Lakmal, H.; Maduranga, M.; Kathriarachchi, R. Malware Detection of IoT Networks Using Machine Learning: An Experimental Study with Edge IIoT Dataset. In Proceedings of the 30th Annual Technical Conference-IET Sri Lanka Network, Colombo, Sri Lanka, 5 August 2023. [Google Scholar]
- Moustafa, N.; Keshky, M.; Debiez, E.; Janicke, H. Federated TON_IoT Windows datasets for evaluating AI-based security applications. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December–1 January 2020; IEEE: New York, NY, USA, 2020; pp. 848–855. [Google Scholar]
- Qu, Z.; Cai, Z. FEDSA-ResnetV2: An Efficient Intrusion Detection System for Vehicle Road Cooperation Based on Federated Learning. IEEE Internet Things J. 2024. [Google Scholar] [CrossRef]
- Qin, Y.; Kondo, M. Federated learning-based network intrusion detection with a feature selection approach. In Proceedings of the 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Kuala Lumpur, Malaysia, 12–13 June 2021; IEEE: New York, NY, USA, 2021; pp. 1–6. [Google Scholar]
- Khan, I.A.; Moustafa, N.; Pi, D.; Haider, W.; Li, B.; Jolfaei, A. An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 23, 25469–25478. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the Artificial Intelligence and Statistics, PMLR, Fort Lauderdale, FL, USA, 20–22 April 2017; pp. 1273–1282. [Google Scholar]
- Song, H.M.; Kim, H.K. Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans. Veh. Technol. 2021, 70, 1098–1108. [Google Scholar] [CrossRef]
- Moustafa, N. A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 2021, 72, 102994. [Google Scholar] [CrossRef]
- Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
- Anyanwu, G.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Real-time position falsification attack detection system for internet of vehicles. In Proceedings of the 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vasteras, Sweden, 7–10 September 2021; IEEE: New York, NY, USA, 2021; pp. 1–4. [Google Scholar]
- Otoum, Y.; Nayak, A. Signature-over-the-air with transfer learning ids for intelligent connected vehicles (icv). In Proceedings of the 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; IEEE: New York, NY, USA, 2021; pp. 1–6. [Google Scholar]
- Makkar, A.; Kim, T.W.; Singh, A.K.; Kang, J.; Park, J.H. Secureiiot environment: Federated learning empowered approach for securing iiot from data breach. IEEE Trans. Ind. Inform. 2022, 18, 6406–6414. [Google Scholar] [CrossRef]
- Abou El Houda, Z.; Naboulsi, D.; Kaddoum, G. A privacy-preserving collaborative jamming attacks detection framework using federated learning. IEEE Internet Things J. 2023, 11, 12153–12164. [Google Scholar] [CrossRef]
- Alanazi, M.; Aljuhani, A. Anomaly Detection for Internet of Things Cyberattacks. Comput. Mater. Contin. 2022, 72, 261–279. [Google Scholar] [CrossRef]
- Polat, H.; Turkoglu, M.; Polat, O. Deep network approach with stacked sparse autoencoders in detection of DDoS attacks on SDN-based VANET. Iet Commun. 2020, 14, 4089–4100. [Google Scholar] [CrossRef]
- Shah, S.A.A.; Ahmed, E.; Imran, M.; Zeadally, S. 5G for vehicular communications. IEEE Commun. Mag. 2018, 56, 111–117. [Google Scholar] [CrossRef]
- Aloqaily, M.; Otoum, S.; Al Ridhawi, I.; Jararweh, Y. An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 2019, 90, 101842. [Google Scholar] [CrossRef]
- Kosmanos, D.; Pappas, A.; Maglaras, L.; Moschoyiannis, S.; Aparicio-Navarro, F.J.; Argyriou, A.; Janicke, H. A novel intrusion detection system against spoofing attacks in connected electric vehicles. Array 2020, 5, 100013. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–8. [Google Scholar] [CrossRef]
- Korium, M.S.; Saber, M.; Beattie, A.; Narayanan, A.; Sahoo, S.; Nardelli, P.H. Intrusion detection system for cyberattacks in the Internet of Vehicles environment. Ad Hoc Netw. 2024, 153, 103330. [Google Scholar] [CrossRef]
- Limouchi, E.; Chan, F. Optimized Machine Learning-Based Intrusion Detection System for Internet of Vehicles. In Proceedings of the 2023 IEEE Symposium Series on Computational Intelligence (SSCI), Mexico City, Mexico, 5–8 December 2023; IEEE: New York, NY, USA, 2023; pp. 1151–1157. [Google Scholar]
- Li, X.; Zhang, H. A survey on DDoS attacks in IoV and corresponding detection mechanisms. IEEE Commun. Surv. Tutor. 2019, 21, 312–336. [Google Scholar]
- Feng, J.; Li, Z. An intelligent collaborative edge computing approach for DDoS detection in IoV. IEEE Access 2019, 7, 40596–40605. [Google Scholar]
- Liu, Y.; Wang, L. Detecting DDoS attacks in IoV using deep learning techniques. IEEE Trans. Intell. Transp. Syst. 2018, 19, 2306–2317. [Google Scholar]
Paper Ref. | Year | Dataset | Description | Features | ML Techniques | Testbed | IoT/IIoT/IOV Devices | Threats | Learning Approach | Traffic |
---|---|---|---|---|---|---|---|---|---|---|
Akshat Gaurav [19] | 2023 | FL-IoV2023 | Built for detecting misbehavior in 5G-enabled IoV using Federated Learning. | 50 | FL, CNN, RNN, LSTM | Real-world | Multiple IoV devices | Malicious communication, DDoS attacks | Centralized (✗) FL (✓) | IoT (✓) IoV (✓) |
Goncalves, F. [20] | 2022 | IoV-Sec2022 | Focuses on security in IoV networks with data collected from real traffic. | 45 | SVM, RF, GB, DT, Federated SVM | Simulated | IoV devices | DDoS, data injection, malware | Centralized (✓) FL (✓) | IoT (✓) IoV (✗) |
Gruebler, A. [21] | 2022 | 5G-IoT2021 | Dataset for 5G IoT traffic with multiple types of IoT devices and various attack scenarios. | 40 | DT, KNN, FL-Boosting | Virtual | Various IoT devices | Spoofing, eavesdropping, DDoS | Centralized (✓) FL (✓) | IoT (✓) IoV (✗) |
P. Rani [22] | 2023 | SecureIoV | Collected from 5G-enabled IoV networks including different types of vehicular communication attacks. | 55 | Federated DT, RNN, LSTM | Real-world | IoV and IIoT devices | Vehicle hijacking, DDoS | Centralized (✗) FL (✓) | IoT (✓) IoV (✓) |
Wanting [23] | 2023 | CIC-IDS2017 | Used for evaluating IDS with various types of attacks including DDoS, Brute Force, and Port-Scan. | 80 | DT, RF, ET, XGBoost, KNN, SVM | Real-world | Multiple IoV devices | BENIGN, Brute Force, DoS, Port-Scan, Web Attack, Botnet | Centralized (✓) FL (✗) | IoT (✓) IoV (✗) |
Ferrag, M.A. [24] | 2023 | Industrial IoT | Ensuring security of IIoT environments using federated learning. | 35 | FL, SVM, KNN, RF | Simulated | Various IIoT sensors | Data breaches, unauthorized access | Centralized (✗) FL (✓) | IIoT (✓) IoV (✗) |
Jingyi [25] | 2021 | CIC-IDS2017 | Dataset focused on network intrusion detection. | 78 | SVM, KNN, DT, RF | Real-world | IoV devices | DDoS, Web attacks, Botnets | Centralized (✓) | IoT (✓) IIoT (✗) |
Hamza, N. [26] | 2023 | Edge-IIoTset | Comprehensive cybersecurity dataset for IoT and IIoT applications supporting both centralized and FL modes. | 61 | DT, RF, SVM, KNN, DNN | Real-world | Various IoT/IIoT devices | Malware, network intrusions | Centralized (✓) FL (✓) | IoT (✓) IIoT (✓) IoV (✗) |
Mustafa [27] | 2020 | Federated TON_IoT | Created for evaluating IoT/IIoT security using FL. Includes data from various sources and 9 attack categories. | 50 | Various | Real-world | Various IoT devices | DoS/DDoS, scanning, ransomware, backdoor, injection, XSS, password, MITM | Centralized (✗) FL (✓) | IoT (✓) IIoT (✓) IoV (✗) |
Ours | 2024 | CICDDOS 2019 | Efficient DDoS attack detection in IoV using Gini Index and FL. | 25 | DT, RF, XGBoost, GB, KNN | Simulated | Various VANET devices | Various DDoS attacks | Centralized (✗) FL (✓) | IoT (✓) IoV (✓) |
Sr. No. | Feature Name | Data Type |
---|---|---|
1 | source_port | int64 |
2 | destination_port | int64 |
3 | flow_duration | int64 |
4 | total_length_of_fwd_Spackets | int64 |
5 | Fwd_Packet_Length_Max | int64 |
6 | Fwd_Packet_Length_Min | int64 |
7 | Fwd_Packet_Length_Mean | float64 |
8 | Flow_IAT_Mean | float64 |
9 | Flow_IAT_Max | int64 |
10 | Flow_IAT_Min | int64 |
11 | Fwd_IAT_Total | int64 |
12 | Fwd_IAT_Max | int64 |
13 | Fwd_IAT_Min | int64 |
14 | Fwd_Header_Length | float64 |
15 | fwd_packets/s | float64 |
16 | Min_Packet_Length | int64 |
17 | Max_Packet_Length | int64 |
18 | Packet_Length_Mean | float64 |
19 | Average_Packet_Size | float64 |
20 | Avg_Fwd_Segment_Size | float64 |
21 | Fwd_Header_Length.1 | float64 |
22 | Subflow_Fwd_Bytes | int64 |
23 | min_seg_size_forward | int64 |
24 | time | object |
25 | label | object |
Sr. No. | Attack Type | Total Samples | Training Samples | Testing Samples |
---|---|---|---|---|
1 | BENIGN | 183 | 144 | 39 |
2 | DrDoS_DNS | 21,635 | 17,234 | 4401 |
3 | DrDoS_LDAP | 1250 | 1020 | 230 |
4 | DrDoS_NTP | 7 | 5 | 2 |
5 | DrDoS_NetBIOS | 454 | 365 | 89 |
6 | DrDoS_SNMP | 21,856 | 17,461 | 4395 |
7 | DrDoS_SSDP | 131 | 112 | 19 |
8 | DrDoS_UDP | 6949 | 5591 | 1358 |
9 | LDAP | 2173 | 1738 | 435 |
10 | NetBIOS | 15,563 | 12,468 | 3095 |
11 | Portmap | 799 | 652 | 147 |
12 | Syn | 22 | 15 | 7 |
13 | TFTP | 579 | 461 | 118 |
14 | UDP | 3684 | 2966 | 718 |
15 | UDP-lag | 218 | 171 | 47 |
16 | UDPLag | 5 | 4 | 1 |
17 | WebDDoS | 2 | 1 | 1 |
Models | All Features Acc | 25 Features Acc |
---|---|---|
Decision Tree | 0.92% | 0.93% |
Random Forest | 0.92% | 0.93% |
XGBoost Classifier | 0.94% | 0.94% |
Gradient Boosting | 0.93% | 0.93% |
KNeighborsClassifier | 0.85% | 0.85% |
Model | Accuracy | Macro Avg Precision | Macro Avg Recall | Macro Avg F1-Score |
---|---|---|---|---|
Using Machine Learning Models | ||||
Decision Tree | 0.93 | 0.69 | 0.70 | 0.70 |
Random Forest | 0.93 | 0.73 | 0.69 | 0.70 |
XGBoost | 0.94 | 0.71 | 0.69 | 0.69 |
Gradient Boosting | 0.93 | 0.71 | 0.65 | 0.67 |
KNN | 0.85 | 0.60 | 0.44 | 0.46 |
Using Federated Learning Models | ||||
Decision Tree | 0.92 | 0.68 | 0.67 | 0.67 |
Random Forest | 0.92 | 0.69 | 0.68 | 0.68 |
XGBoost | 0.93 | 0.68 | 0.67 | 0.67 |
Gradient Boosting | 0.92 | 0.66 | 0.67 | 0.66 |
KNN | 0.88 | 0.68 | 0.67 | 0.67 |
Task Type | Model Complexity | Models Used | Total Time (Hours) | Power Consumption (kWh) |
---|---|---|---|---|
ML | Simpler Models | Decision Tree, K-Neighbors Classifier | 5 to 15 | 0.25 to 0.75 |
Complex Models | Random Forest, XGBoost, Gradient Boosting | 15 to 35 | 0.75 to 1.75 | |
FL | Simpler Models | Decision Tree, K-Neighbors Classifier | 7 to 20 | 0.35 to 1.00 |
Complex Models | Random Forest, XGBoost, Gradient Boosting | 10 to 30 | 0.417 to 1.25 |
Model | Scenario | Running Time | Memory Usage | Performance Summary |
---|---|---|---|---|
Decision Tree | All Features | 1.05 s | 1157.10 MB | Fastest model with all features but moderate memory consumption |
ML Model (25 Features) | 0.82 s | 570.51 MiB | Faster with reduced memory (about 50% memory saved) | |
FL Models (25 Features) | 2.75 s | 837.93 MB | Slightly slower but manageable memory usage in federated learning | |
Avg. Round Per Client (FL) | 0.0075 s | 0.0456 MB | Efficient in FL with minimal memory and time per round | |
Random Forest | All Features | 18.91 s | 1171.41 MB | Balanced performance, slower than Decision Tree but consistent |
25 Features | 14.02 s | 594.97 MiB | Noticeable speedup, memory reduction by 50% | |
FL Models (25 Features) | 16.53 s | 954.91 MB | Similar performance to 25 features but slightly higher memory in FL | |
Avg. Round Per Client (FL) | 0.8199 s | 0.1748 MB | Moderate time and memory usage per round in FL | |
XGBoost | All Features | 60.24 s | 1186.96 MB | Much slower execution with high memory consumption |
25 Features | 13.82 s | 612.95 MiB | Dramatic improvement in execution and memory usage | |
FL Models (25 Features) | 14.10 s | 851.43 MB | Stable performance in FL, faster than full-feature version | |
Avg. Round Per Client (FL) | 0.4015 s | 0.3639 MB | Moderate time with slightly higher memory in FL | |
Gradient Boosting | All Features | 460.57 s | 1194.47 MB | Extremely slow compared to all other models with high memory demand |
25 Features | 358.78 s | 617.83 MiB | Better performance with feature reduction, but still much slower than others | |
FL Models (25 Features) | 400.20 s | 862.06 MB | Similar slow performance in FL, but decent memory savings compared to all features | |
Avg. Round Per Client (FL) | 1.5169 s | 0.1964 MB | Longer time with moderate memory in FL | |
KNN | All Features | 11.78 s | 1291.00 MB | Quick execution but highest memory usage with all features |
25 Features | 0.23 s | 627.52 MiB | Fastest model with lowest memory usage drop (50%) | |
FL Models (25 Features) | 0.21 s | 838.70 MB | Continues to be the fastest even in federated learning, though memory usage increases | |
Avg. Round Per Client (FL) | 0.0022 s | 0.0452 MB | Fastest in FL with minimal memory usage |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dilshad, M.; Syed, M.H.; Rehman, S. Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning. Future Internet 2025, 17, 9. https://doi.org/10.3390/fi17010009
Dilshad M, Syed MH, Rehman S. Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning. Future Internet. 2025; 17(1):9. https://doi.org/10.3390/fi17010009
Chicago/Turabian StyleDilshad, Muhammad, Madiha Haider Syed, and Semeen Rehman. 2025. "Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning" Future Internet 17, no. 1: 9. https://doi.org/10.3390/fi17010009
APA StyleDilshad, M., Syed, M. H., & Rehman, S. (2025). Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning. Future Internet, 17(1), 9. https://doi.org/10.3390/fi17010009