• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用统计流分析和机器学习在软件定义的车载网络中进行有效的分布式拒绝服务攻击检测

Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning.

作者信息

Babbar Himanshi, Rani Shalli, Driss Maha

机构信息

Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, Rajpura, India.

RIOTU Lab, CCIS, Prince Sultan University, Riyadh, Saudi Arabia.

出版信息

PLoS One. 2024 Dec 18;19(12):e0314695. doi: 10.1371/journal.pone.0314695. eCollection 2024.

DOI:10.1371/journal.pone.0314695
PMID:39693292
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11654938/
Abstract

Vehicular Networks (VN) utilizing Software Defined Networking (SDN) have garnered significant attention recently, paralleling the advancements in wireless networks. VN are deployed to optimize traffic flow, enhance the driving experience, and ensure road safety. However, VN are vulnerable to Distributed Denial of Service (DDoS) attacks, posing severe threats in the contemporary Internet landscape. With the surge in Internet traffic, this study proposes novel methodologies for effectively detecting DDoS attacks within Software-Defined Vehicular Networks (SDVN), wherein attackers commandeer compromised nodes to monopolize network resources, disrupting communication among vehicles and between vehicles and infrastructure. The proposed methodology aims to: (i) analyze statistical flow and compute entropy, and (ii) implement Machine Learning (ML) algorithms within SDN Intrusion Detection Systems for Internet of Things (IoT) environments. Additionally, the approach distinguishes between reconnaissance, Denial of Service (DoS), and DDoS traffic by addressing the challenges of imbalanced and overfitting dataset traces. One of the significant challenges in this integration is managing the computational load and ensuring real-time performance. The ML models, especially complex ones like Random Forest, require substantial processing power, which necessitates efficient data handling and possibly leveraging edge computing resources to reduce latency. Ensuring scalability and maintaining high detection accuracy as network traffic grows and evolves is another critical challenge. By leveraging a minimal subset of features from a given dataset, a comparative study is conducted to determine the optimal sample size for maximizing model accuracy. Further, the study evaluates the impact of various dataset attributes on performance thresholds. The K-nearest Neighbor, Random Forest, and Logistic Regression supervised ML classifiers are assessed using the BoT-IoT dataset. The results indicate that the Random Forest classifier achieves superior performance metrics, with Precision, F1-score, Accuracy, and Recall rates of 92%, 92%, 91%, and 90%, respectively, over five iterations.

摘要

利用软件定义网络(SDN)的车载网络(VN)最近受到了广泛关注,这与无线网络的发展同步。部署VN是为了优化交通流量、提升驾驶体验并确保道路安全。然而,VN容易受到分布式拒绝服务(DDoS)攻击,在当代互联网环境中构成严重威胁。随着互联网流量的激增,本研究提出了新颖的方法,用于在软件定义车载网络(SDVN)中有效检测DDoS攻击,在这种网络中,攻击者控制被攻陷的节点以垄断网络资源,扰乱车辆之间以及车辆与基础设施之间的通信。所提出的方法旨在:(i)分析统计流并计算熵,以及(ii)在物联网(IoT)环境的SDN入侵检测系统中实现机器学习(ML)算法。此外,该方法通过应对数据集痕迹不平衡和过拟合的挑战,区分侦察、拒绝服务(DoS)和DDoS流量。这种集成中的一个重大挑战是管理计算负载并确保实时性能。ML模型,尤其是像随机森林这样的复杂模型,需要大量处理能力,这就需要高效的数据处理,并可能利用边缘计算资源来减少延迟。随着网络流量的增长和演变,确保可扩展性并保持高检测准确率是另一个关键挑战。通过利用给定数据集中的最小特征子集,进行了一项比较研究,以确定最大化模型准确率的最佳样本大小。此外,该研究评估了各种数据集属性对性能阈值的影响。使用BoT - IoT数据集评估了K近邻、随机森林和逻辑回归监督ML分类器。结果表明,随机森林分类器在五次迭代中分别实现了92%、92%、91%和90%的精确率、F1分数、准确率和召回率,性能指标优越。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/d50a4172f08c/pone.0314695.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/5a7b48021c0a/pone.0314695.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/93c82cd9a528/pone.0314695.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/7c515fb9a258/pone.0314695.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/08a31ad5dfb0/pone.0314695.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/d8b2443f916e/pone.0314695.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/83c1ba0b9a51/pone.0314695.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/0126ff7da8c7/pone.0314695.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/c8b46124e1d4/pone.0314695.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/cb9947150ca6/pone.0314695.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/3a142c869ea9/pone.0314695.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/2405fc94debd/pone.0314695.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/a1ba91876ca1/pone.0314695.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/9fba063ae8f4/pone.0314695.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/de1d10bdad95/pone.0314695.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/3724a2393275/pone.0314695.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/d50a4172f08c/pone.0314695.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/5a7b48021c0a/pone.0314695.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/93c82cd9a528/pone.0314695.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/7c515fb9a258/pone.0314695.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/08a31ad5dfb0/pone.0314695.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/d8b2443f916e/pone.0314695.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/83c1ba0b9a51/pone.0314695.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/0126ff7da8c7/pone.0314695.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/c8b46124e1d4/pone.0314695.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/cb9947150ca6/pone.0314695.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/3a142c869ea9/pone.0314695.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/2405fc94debd/pone.0314695.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/a1ba91876ca1/pone.0314695.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/9fba063ae8f4/pone.0314695.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/de1d10bdad95/pone.0314695.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/3724a2393275/pone.0314695.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fbb4/11654938/d50a4172f08c/pone.0314695.g016.jpg

相似文献

1
Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning.使用统计流分析和机器学习在软件定义的车载网络中进行有效的分布式拒绝服务攻击检测
PLoS One. 2024 Dec 18;19(12):e0314695. doi: 10.1371/journal.pone.0314695. eCollection 2024.
2
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
3
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
4
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.
5
A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks.基于特征工程和机器学习的软件定义网络中的 DDoS 检测方法。
Sensors (Basel). 2023 Jul 5;23(13):6176. doi: 10.3390/s23136176.
6
IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks.IFACNN:基于改进萤火虫算法优化卷积神经网络的高效 DDoS 攻击检测。
Math Biosci Eng. 2022 Jan;19(2):1280-1303. doi: 10.3934/mbe.2022059. Epub 2021 Dec 2.
7
Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments.增强5G边缘网络的安全性:在软件定义网络(SDN)环境中使用机器学习预测实时零信任攻击
Sensors (Basel). 2025 Mar 19;25(6):1905. doi: 10.3390/s25061905.
8
BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.增强集成机器学习的物联网系统网络攻击检测高效技术:BoostedEnML
Sensors (Basel). 2022 Sep 29;22(19):7409. doi: 10.3390/s22197409.
9
Advanced machine learning approach for DoS attack resilience in internet of vehicles security.用于车辆互联网安全中抵御拒绝服务攻击的先进机器学习方法。
Heliyon. 2024 Mar 29;10(8):e28844. doi: 10.1016/j.heliyon.2024.e28844. eCollection 2024 Apr 30.
10
Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network.有效特征选择方法可用于检测 5G 核心网络中的物联网 DDoS 攻击。
Sensors (Basel). 2022 May 18;22(10):3819. doi: 10.3390/s22103819.

本文引用的文献

1
Software defined networking based network traffic classification using machine learning techniques.基于软件定义网络并使用机器学习技术的网络流量分类
Sci Rep. 2024 Aug 29;14(1):20060. doi: 10.1038/s41598-024-70983-6.
2
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.通过K近邻算法检测物联网中的安卓恶意软件。
Sensors (Basel). 2023 Aug 18;23(16):7256. doi: 10.3390/s23167256.
3
A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks.
基于特征工程和机器学习的软件定义网络中的 DDoS 检测方法。
Sensors (Basel). 2023 Jul 5;23(13):6176. doi: 10.3390/s23136176.
4
Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization.基于人工神经网络群组密钥同步的自动驾驶车辆信息融合。
Sensors (Basel). 2022 Feb 20;22(4):1652. doi: 10.3390/s22041652.