4.5 Article

Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2020.2971776

Keywords

Computer crime; Denial-of-service attack; IP networks; Entropy; Deep learning; Feature extraction; Distributed denial of service; deep learning; convolutional neural networks; edge computing

Funding

  1. European Union [815141]
  2. EPSRC [EP/K004379/1, EP/N508664/1, EP/R007187/1] Funding Source: UKRI

Ask authors/readers for more resources

Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's Internet, disrupting the availability of essential services. The challenge of DDoS detection is the combination of attack approaches coupled with the volume of live traffic to be analysed. In this paper, we present a practical, lightweight deep learning DDoS detection system called Lucid, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign. We make four main contributions; (1) an innovative application of a CNN to detect DDoS traffic with low processing overhead, (2) a dataset-agnostic preprocessing mechanism to produce traffic observations for online attack detection, (3) an activation analysis to explain Lucid's DDoS classification, and (4) an empirical validation of the solution on a resource-constrained hardware platform. Using the latest datasets, Lucid matches existing state-of-the-art detection accuracy whilst presenting a 40x reduction in processing time, as compared to the state-of-the-art. With our evaluation results, we prove that the proposed approach is suitable for effective DDoS detection in resource-constrained operational environments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Automation & Control Systems

3-D Human Pose Estimation Using Iterative Conditional Squeeze and Excitation Networks

Niall McLaughlin, Jesus Martinez-del-Rincon, Paul Miller

Summary: The proposed method for single-camera real-world 3-D human pose estimation combines multitask training, iterative pose refinement, and a novel conditional attention mechanism. By training on both 2-D and 3-D pose datasets, the method achieves robust and competitive performance without the need for a large-scale in-the-wild 3-D pose dataset. The efficiency of the method allows for real-time pose estimation on commodity hardware.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Computer Science, Artificial Intelligence

A zero-shot deep metric learning approach to Brain-Computer Interfaces for image retrieval

Ben McCartney, Barry Devereux, Jesus Martinez-del-Rincon

Summary: This paper proposes a deep learning based approach for image retrieval using EEG, which utilizes a multi-modal deep neural network and metric learning to map EEG signals and visual information. With the scalable metric learning approach, the system achieves zero-shot image retrieval with new images and demonstrates state-of-the-art results on standard EEG image-viewing datasets.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Computer Science, Information Systems

An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection

Jose Roldan-Gomez, Jesus Martinez del Rincon, Juan Boubeta-Puig, Jose Luis Martinez

Summary: In recent years, the Internet of Things (IoT) has grown rapidly, leading to an increase in attacks against it. This paper proposes an architecture that can generate complex event processing (CEP) rules for real-time attack detection in an automatic and unsupervised manner. By integrating CEP technology with principal component analysis (PCA), Gaussian mixture models (GMM), and the Mahalanobis distance, the architecture is able to analyze and correlate large amounts of data in real time, making it suitable for IoT environments. The testing of this architecture in simulated attack scenarios shows that the generated rules achieve a high F1 score of .9890 in real-time detection of six different IoT attacks.

WIRELESS NETWORKS (2023)

Article Computer Science, Hardware & Architecture

Estimating Code Vulnerability to Timing Errors Via Microarchitecture-Aware Machine Learning

Styliani Tompazi, Ioannis Tsiokanos, Jesus Martinez del Rincon, Georgios Karakonstantis

Summary: This article focuses on modeling timing errors and estimating the vulnerability of software programs using microarchitecture-aware methods. It utilizes a machine learning-based error prediction model and a workload-aware error prediction model to quantify the susceptibility of applications to timing errors.

IEEE DESIGN & TEST (2023)

Article Computer Science, Theory & Methods

Resource-Efficient Convolutional Networks: A Survey on Model-, Arithmetic-, and Implementation-Level Techniques

Junkyu Lee, Lev Mukhanov, Amir Sabbagh Molahosseini, Umar Minhas, Yang Hua, Jesus Martinez Del Rincon, Kiril Dichev, Cheol-Ho Hong, Hans Vandierendonck

Summary: This article provides a survey on resource-efficient CNN techniques in terms of model-, arithmetic-, and implementation-level techniques, and discusses the future trend for resource-efficient CNN research.

ACM COMPUTING SURVEYS (2023)

Article Energy & Fuels

EECO: An AI-Based Algorithm for Energy-Efficient Comfort Optimisation

Giacomo Segala, Roberto Doriguzzi-Corin, Claudio Peroni, Matteo Gerola, Domenico Siracusa

Summary: Environmental comfort is crucial for people's well-being and health, and both passive and active strategies are employed in buildings to achieve it. This research proposes an adaptive solution for comfort optimization in HVAC systems, using a convolutional neural network to predict the impact of different actuation strategies on thermal comfort and energy consumption. The results show significant reductions in energy consumption while maintaining the desired thermal comfort.

ENERGIES (2023)

Article Automation & Control Systems

An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns

Jose Roldan-Gomez, Juan Boubeta-Puig, Javier Carrillo-Mondejar, Juan Manuel Castelo Gomez, Jesus Martinez del Rincon

Summary: The Internet of Things (IoT) has rapidly grown, leading to the integration of sensors with IoT devices. However, the number of attacks against these devices has also increased as fast as the paradigm itself. Therefore, it is necessary to design, implement, and study new cybersecurity solutions.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2023)

Article Computer Science, Information Systems

Vehicle Damage Severity Estimation for Insurance Operations Using In-The-Wild Mobile Images

Dimitrios Mallios, Li Xiaofei, Niall McLaughlin, Jesus Martinez Del Rincon, Clare Galbraith, Rory Garland

Summary: This research proposes an automatic car damage assessment method using image data to determine the compensation amount for insurance customers. The method utilizes photographs of damaged cars collected from multiple angles by users, as well as structured data about the vehicles. By employing computer-vision models for damage detection and extent determination, the proposed pipeline accurately estimates the cost of damage.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Distributed Energy Resources Electric Profile Identification in Low Voltage Networks Using Supervised Machine Learning Techniques

Andres F. Moreno Jaramillo, Javier Lopez-Lorente, David M. Laverty, Paul V. Brogan, Santiago H. Hoyos Velasquez, Jesus Martinez-Del-Rincon, Aoife M. Foley

Summary: Increasing integration of distributed energy resources (DER) in the electrical network presents unprecedented challenges for distribution network operators, especially due to the lack of monitoring infrastructure on the low voltage (LV) side. Non-intrusive load monitoring (NILM) methods offer a solution by utilizing machine learning algorithms to identify DER electrical signatures from aggregated measurements at the LV side. This study proposes a novel implementation of NILM methods and achieves high F-1 scores for the identification of Electrical Vehicles (EV) and rooftop photovoltaic (PV) based on real-time low frequency electric measurements.

IEEE ACCESS (2023)

Article Computer Science, Artificial Intelligence

LOFReg: An outlier-based regulariser for deep metric learning

Eleni Kamenou, Jesus Martinez del Rincon, Paul Miller, Patricia Devlin-Hill, Samuel Budgett, Federico Angelini, Charlotte Grinyer

Summary: This paper proposes a novel density-based regularizer, LOFReg, to improve the performance of deep metric learning for re-identification and few-shot classification tasks. Experimental results demonstrate that LOFReg can effectively enhance the generalization ability of the model and achieve a more evenly distributed embedding space compared to previous metric learning loss functions.

COMPUTER VISION AND IMAGE UNDERSTANDING (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Convolutional Neural Network for Software Vulnerability Detection

Kaixi Yang, Paul Miller, Jesus Martinez-del-Rincon

Summary: Exploitable vulnerabilities in software are a fundamental cause of cybercrime, resulting in financial losses, reputational damage, and broader security breaches for both enterprises and consumers. To address this issue, a deep learning model is proposed that can recognize risk signals in Java source code and categorize programs as either vulnerable or safe. The model achieves an F1 score of 0.92 when evaluated on the Juliet Test Suite dataset.

2022 CYBER RESEARCH CONFERENCE - IRELAND (CYBER-RCI) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Closing the Domain Gap for Cross-modal Visible-Infrared Vehicle Re-identification

Eleni Kamenou, Jesus Martinez del Rincon, Paul Miller, Patricia Devlin-Hill

Summary: This paper proposes an end-to-end 2-stream system for vehicle re-identification (ReID) that aims to solve the challenges of multi-modal and cross-modal ReID. The system utilizes infrared and visible spectrum data and minimizes the domain shift between the two modalities through domain alignment and inter-modality learning. It achieves state-of-the-art results on the RGBN300 dataset.

2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR) (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Digital Twin for the 5G Era: the SPIDER Cyber Range

Filippo Rebecchi, Antonio Pastor, Alberto Mozo, Chiara Lombardo, Roberto Bruschi, Ilias Aliferis, Roberto Doriguzzi-Corin, Panagiotis Gouvas, Antonio Alvarez Romero, Anna Angelogianni, Ilias Politis, Christos Xenakis

Summary: Service providers, 5G network operators, and vertical industries are facing a dangerous shortage of highly skilled cybersecurity experts. The SPIDER cyber range, focusing on 5G, aims to train and evaluate cyber security teams and assess cyber risk through a customized 5G network environment.

2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022) (2022)

Proceedings Paper Computer Science, Software Engineering

Towards Application-Aware Provisioning of Security Services with Kubernetes

Roberto Doriguzzi-Corin, Silvio Cretti, Tiziana Catena, Simone Magnani, Domenico Siracusa

Summary: Network Function Virtualization can be used to implement personalized security services, but current software platforms like Kubernetes have limitations. This work combines a state-of-the-art algorithm for application-aware provisioning of security services with Kubernetes, improving basic provisioning mechanisms.

PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES (2022)

Article Computer Science, Information Systems

DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems

Maged Abdelaty, Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This article introduces DAICS, a deep learning framework for large ICSs that learns the changes in behavior with a small number of data samples and gradient updates. It also includes an automatic tuning mechanism for the detection threshold, improving detection rate, accuracy, and robustness to additive noise.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2022)

No Data Available