[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

LEAESN: Predicting DDoS attack in healthcare systems based on Lyapunov Exponent Analysis and Echo State Neural Networks

Published: 01 December 2022 Publication History

Abstract

The availability of the system is one of the main requirements of a multimedia-based e-health application that carries critical patient health information in the network environment. On the other hand, the Distributed Denial of Service (DDoS) attack is one of the most common attacks on the availability of computer networks which can be devastating for a healthcare system. Therefore, a countermeasure to this attack has to be performed in the early steps of the attack to protect the systems against its damages. Detection methods cannot support this and are only able to detect the attack after it happened. Thus, it is necessary to predict DDoS attacks according to the evidence which the attack makes in the network in the early steps of the attack. Therefore, Prediction approaches can reduce the cost of the attacks compared to detection approaches. In this paper, we propose a new method for prediction of DDoS attack based on Lyapunov Exponent Analysis and Echo State Network (LEAESN). In this method, the future traffic of the network is predicted using the Exponential Smoothing technique, then the time series of the prediction error is calculated based on the difference of this prediction and the observed traffic of the network. As shown in this paper, this time series is chaotic in the presence of attack traffics. To predict the DDoS attack, this time series is predicted using a Recurrent Neural Echo State Network (SCESN), and the attack is detected using Lyapunov exponent analysis on the predicted time series. For the evaluation of LEAESN, we test the method on the Darpa98 dataset which consists of a standard dataset for evaluation of intrusion detection systems. LEAESN has an appropriate ability to predict the DDoS attack.

References

[1]
Abbas H, Latif R, Latif S, and Masood A Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems Ann Telecommun 2016 71 9–10 477-487
[2]
Akrami A, Rostami H, and Khosravi MR Design of a reservoir for cloud-enabled echo state network with high clustering coefficient EURASIP J Wirel Commun Netw 2020 2020 1-14
[3]
Alarqan MA, Zaaba ZF, Almomani A (2019) Detection mechanisms of DDoS Attack in cloud computing environment: A Survey. In: International Conference on Advances in Cyber Security. s.l.:Springer, Berlin, pp 138–152
[4]
Bhattacharyya DK, Kalita JK (2016) DDoS attacks: evolution, detection, prevention, reaction, and tolerance. s.l.:Chapman and Hall/CRC, London
[5]
Boeing G Visual analysis of nonlinear dynamical systems: chaos, fractals, self-similarity and the limits of prediction Systems 2016 4 4 37
[6]
Bradley E and Kantz H Nonlinear time-series analysis revisited Chaos 2015 25 9 097610
[7]
Cao L Practical method for determining the minimum embedding dimension of a scalar time series Phys D 1997 110 1–2 43-50
[8]
Chen Y, Ma X, and Wu X DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory IEEE Commun Lett 2013 17 5 1052-1054
[9]
Chonka A, Singh J, and Zhou W Chaos theory based detection against network mimicking DDoS attacks IEEE Commun Lett 2009 13 9 717-719
[10]
Cisco (2018) Cisco 2018 annual cybersecurity report, s.l.: Cisco, San Jose
[12]
Farmer JD and Sidorowich JJ Predicting chaotic time series Phys Rev Lett 1987 59 8 845
[13]
Hilborn RC (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers. Oxford University Press on Demand, Oxford
[14]
Huffaker R (2010) Phase space reconstruction from time series data: where history meets theory. Proc Food Syst Dyn :1–9. 7
[15]
Jaeger H (2001) The “echo state” approach to analysing and training recurrent neural networks-with an erratum note. Germany: German National Research Center for Information Technology GMD Technical Report 148.34
[16]
Karimazad R, Faraahi A (2011) An anomaly-based method for DDoS attacks detection using RBF neural networks. In: Proceedings of the International Conference on Network and Electronics Engineering
[17]
Khosravi MR and Yazdi M A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights Neural Comput Appl 2018 30 7 2017-2028
[18]
Kim H, Eykholt R, and Salas JD Nonlinear dynamics, delay times, and embedding windows Phys D 1999 127 1 48-60
[19]
Kolias C, Kambourakis G, Stavrou A, and Voas J DDoS in the IoT: mirai and other botnets Computer 2017 50 7 80-84
[20]
Lakhina A, Crovella M, and Diot C Diagnosing network-wide traffic anomalies ACM SIGCOMM Comput Commun Rev 2004 34 4 219-230
[21]
Lorenz E (1972) Predictability: Does the flap of a butterfly’s wings in brazil set off a tornado in Texas? AAAS 139th Meeting, USA. http://climate.envsci.rutgers.edu/climdyn2017/LorenzButterfly.pdf
[22]
Ma X and Chen Y DDoS detection method based on chaos analysis of network traffic entropy IEEE Commun Lett 2014 18 1 114-117
[23]
Najibi E and Rostami H SCESN, SPESN, SWESN: Three recurrent neural echo state networks with clustered reservoirs for prediction of nonlinear and chaotic time series Appl Intell 2015 43 2 460-472
[24]
Nezhad SMT, Nazari M, and Gharavol EA A novel DoS and DDoS attacks detection algorithm using ARIMA time series model and chaotic system in computer networks IEEE Commun Lett 2016 20 4 700-703
[25]
Peddi SVB et al. An intelligent cloud-based data processing broker for mobile e-health multimedia applications Futur Gener Comput Syst 2017 66 71-86
[26]
Procopiou A, Komninos N, and Douligeris C ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT Network Wirel Commun Mob Comput 2019 2019 1-14
[27]
Pyragas K Predictable chaos in slightly perturbed unpredictable chaotic systems Phys Lett A 1993 181 3 203-210
[28]
Rickles D, Hawe P, and Shiell A A simple guide to chaos and complexity J Epidemiol Commun Health 2007 61 11 933-937
[29]
Rosenstein MT, Collins JJ, and De Luca CJ A practical method for calculating largest Lyapunov exponents from small data sets Phys D 1993 65 1–2 117-134
[30]
Saied A, Overill RE, and Radzik T Detection of known and unknown DDoS attacks using Artificial Neural Networks Neurocomputing 2016 172 385-393
[31]
Somasundaram R, Thirugnanam M (2020) Review of security challenges in healthcare internet of things. Wireless Netw. https://link.springer.com/article/10.1007/s11276-020-02340-0
[32]
Symantec (2018) 2018 internet security threat report. Access through https://www.pcmsystems.co.uk/news/2018-04-10/symantec-internet-securitythreat-report-2018
[33]
Takens F Detecting strange attractors in turbulence Lect Notes Math 1981 898 1 366-381
[34]
Velliangiri S, Karthikeyan P, Vinoth Kumar V (2020) Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. J Exp Theor Artif Intell :1–20.
[35]
Verisign (2018) Verisign distributed denial of service trends report, s.l.: Verisign, Reston
[36]
Wolf A, Swift B, Swinney JL, and Vastano A Determining Lyapunov exponents from a time series Phys D 1985 16 3 285-317
[37]
Wu X and Chen Y Validation of chaos hypothesis in NADA and improved DDoS detection algorithm IEEE Commun Lett 2013 17 12 2396-2399
[38]
Zargar ST, Joshi J, and Tipper D A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks IEEE Commun Surv Tutorials 2013 15 4 2046-2069

Index Terms

  1. LEAESN: Predicting DDoS attack in healthcare systems based on Lyapunov Exponent Analysis and Echo State Neural Networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Multimedia Tools and Applications
        Multimedia Tools and Applications  Volume 81, Issue 29
        Dec 2022
        1540 pages

        Publisher

        Kluwer Academic Publishers

        United States

        Publication History

        Published: 01 December 2022
        Accepted: 10 November 2020
        Revision received: 25 August 2020
        Received: 12 June 2020

        Author Tags

        1. Multimedia-based E-health
        2. Chaos theory
        3. DDoS attack
        4. Echo State Network
        5. Lyapunov exponent
        6. Prediction

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 30 Dec 2024

        Other Metrics

        Citations

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media