Abstract
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interrupt operations. To mitigate these risks, this study introduces an anomaly detection method that utilizes a hybrid convolutional and short-term memory (CNN-LSTM) deep neural network. This model merges the CNN's ability to automatically extract spatial features with the LSTM's proficiency in sequence modeling, thereby enhancing the detection of anomalies in network traffic metadata. The model also integrates an autoencoder structure to facilitate representation learning and reduce dimensionality. The model's effectiveness was tested using publicly accessible SDN datasets, and the results were remarkable. The model identified DDoS attacks with an accuracy rate of over 99%, surpassing the performance of previous shallow learning models. Moreover, the model proved highly adaptable, successfully detecting attacks across various data samples. This deep learning-based detection system is a significant advancement, providing precise and efficient analytics that bolster real-time cybersecurity monitoring. However, it's crucial to continue research in deployment, interpretability, and the potential of combinatorial learning with other advanced technologies. We can only fully harness the great potential of artificial intelligence for adequate cyber protection by looking into these areas.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Simalango, M.F., Kang, M.Y., Oh, S.: Towards constraint-based high performance cloud system in the process of cloud computing adoption in an organization. ArXiv (2010)
Miettinen, M., Sadeghi, A.R.: Keynote: Internet of things or threats? On building trust in IoT. In: 2018 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2018 (2018). https://doi.org/10.1109/CODESISSS.2018.8525931
Abomhara, M., Køien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks (2015). https://doi.org/10.13052/jcsm2245-1439.414
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015). https://doi.org/10.1109/COMST.2015.2444095
Ahmed S., et al.: Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron. Future Internet 2023 15(2), 76 (2023). https://doi.org/10.3390/FI15020076
Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput. Secur. 65, 344–372 (2017). https://doi.org/10.1016/J.COSE.2016.10.005
Khuphiran, P., Leelaprute, P., Uthayopas, P., Ichikawa, K., Watanakeesuntorn, W.: Performance comparison of machine learning models for DDoS attacks detection. In: 2018 22nd International Computer Science and Engineering Conference, ICSEC 2018 (2018). https://doi.org/10.1109/ICSEC.2018.8712757
Farnaaz, N., Jabbar, M.: Random forest modeling for network intrusion detection system. Proc. – Proc. Comput. Sci. 89, 213–217 (2016). https://doi.org/10.1016/j.procs.2016.06.047
Li, Y., Guo, L.: An active learning based TCM-KNN algorithm for supervised network intrusion detection. Comput. Secur. 26(7–8), 459–467 (2007). https://doi.org/10.1016/J.COSE.2007.10.002
Panda, M., Patra, M.: Network Intrusion Detection Using Naïve Bayes (2007)
Li, Y., Zhang, B.: An intrusion detection model based on multi-scale CNN. In: Proceedings of 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2019, pp. 214–218 (2019). https://doi.org/10.1109/ITNEC.2019.8729261
Aydın, H., Orman, Z., Aydın, M.A.: A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. Comput. Secur. 118, 102725 (2022). https://doi.org/10.1016/J.COSE.2022.102725
Javaheri, D., Gorgin, S., Lee, J.A., Masdari, M.: Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives. Inf. Sci. (N. Y.) 626, 315–338 (2023). https://doi.org/10.1016/J.INS.2023.01.067
Basnet, M., Ali, M.H.: WCGAN-based cyber-attacks detection system in the EV charging infrastructure. In: 2022 4th International Conference on Smart Power and Internet Energy Systems, SPIES 2022, pp. 1761–1766 (2022). https://doi.org/10.1109/SPIES55999.2022.10082342
Roopak, M., Tian, G.Y., Chambers, J.: An intrusion detection system against DDoS attacks in IoT networks. In: 2020 10th Annual Computing and Communication Workshop and Conference. CCWC 2020, 562–567 (2020). https://doi.org/10.1109/CCWC47524.2020.9031206
Bouyeddou, B., Harrou, F., Kadri, B., Sun, Y.: Detecting network cyber-attacks using an integrated statistical approach. Cluster Comput 24(2), 1435–1453 (2021). https://doi.org/10.1007/S10586-020-03203-1/TABLES/8
Al-Juboori, S.A.M., Hazzaa, F., Jabbar, Z.S., Salih, S., Gheni, H.M.: Man-in-the-middle and denial of service attacks detection using machine learning algorithms. Bull. Electr. Engin. Inf. 12(1), 418–426 (2023). https://doi.org/10.11591/EEI.V12I1.4555
Yildiz, B.: Coding Theory Lecture Notes By Yildiz, pp. 1–63 (2011)
Diaba, S.Y., Elmusrati, M.: Proposed algorithm for smart grid DDoS detection based on deep learning. Neural Netw. 159, 175–184 (2023). https://doi.org/10.1016/J.NEUNET.2022.12.011
Aswad, F.M., Ahmed, A.M.S., Alhammadi, N.A.M., Khalaf, B.A., Mostafa, S.A.: Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks. J. Intell. Syst. 32(1) (2023). https://doi.org/10.1515/JISYS-2022-0155/MACHINEREADABLECITATION/RIS
Chua, L.O., Roska, T.: The CNN Paradigm. IEEE Trans. Circuits Syst. I: Fundamen. Theory Appl. 40(3), 147–156 (1993). https://doi.org/10.1109/81.222795
Yu, Y., Si, X., Hu, C., Zhang, J.: A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 31(7), 1235–1270 (2019). https://doi.org/10.1162/NECO_A_01199
Farahnakian, F., Heikkonen, J.: A deep auto-encoder based approach for intrusion detection system. In: International Conference on Advanced Communication Technology, ICACT 2018, 178–183 (2018). https://doi.org/10.23919/ICACT.2018.8323688
Tayfour, O.E., Marsono, M.N.: Collaborative detection and mitigation of DDoS in software-defined networks. J. Supercomput. 77(11), 13166–13190 (2021). https://doi.org/10.1007/S11227-021-03782-9/TABLES/14
Ivanova, V., Tashev, T., Draganov, I., Ivanova, V., Tashev, T., Draganov, I.: Detection of IoT based DDoS attacks by network traffic analysis using feedforward neural networks. Int. J. Circuits, Syst. Signal Process. 16, 653–662 (2022). https://doi.org/10.46300/9106.2022.16.81
Prasad, A., Chandra, S.: VMFCVD: an optimized framework to combat volumetric DDoS attacks using machine learning. Arab. J. Sci. Eng. 47, 9965–9983 (2022). https://doi.org/10.1007/s13369-021-06484-9
Al-asadi,T.A., Obaid, A.J.: An efficient web usage mining algorithm based on log file data. J. Theoret. Appl. Inf. Technol. 16, 92(2), 215–224 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khaleel, T.J., Shiltagh, N.A. (2024). DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM. In: Fortino, G., Kumar, A., Swaroop, A., Shukla, P. (eds) Proceedings of Third International Conference on Computing and Communication Networks. ICCCN 2023. Lecture Notes in Networks and Systems, vol 917. Springer, Singapore. https://doi.org/10.1007/978-981-97-0892-5_41
Download citation
DOI: https://doi.org/10.1007/978-981-97-0892-5_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0891-8
Online ISBN: 978-981-97-0892-5
eBook Packages: EngineeringEngineering (R0)