Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network

With the advent of 5G, cyber–physical systems (CPSs) employed in the vertical industries and critical infrastructures will depend on the cellular network more than ever; making their attack surface wider. Hence, guarding the network against cyberattacks is critical not only for its primary subscribers but to prevent it from being exploited as a proxy to attack CPSs. In this article, we propose a consolidated framework, by utilizing deep convolutional neural networks (CNNs) and real network data, to provide early detection for distributed denial-of-service (DDoS) attacks orchestrated by a botnet that controls malicious devices. These puppet devices individually perform silent call, signaling, SMS spamming, or a blend of these attacks targeting call, Internet, SMS, or a blend of these services, respectively, to cause a collective DDoS attack in a cell that can disrupt CPSs’ operations. Our results demonstrate that our framework can achieve higher than $91\%$ normal and underattack cell detection accuracy.

[1]  Daniel L. Marino,et al.  Generalization of Deep Learning for Cyber-Physical System Security: A Survey , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[2]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[3]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[4]  Jiliang Tang,et al.  How Voice Service Threatens Cellular-Connected IoT Devices in the Operational 4G LTE Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[5]  Songwu Lu,et al.  How voice call technology poses security threats in 4G LTE networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[6]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[7]  Lei Gao,et al.  A Traffic Based Lightweight Attack Detection Scheme for VoLTE , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[8]  Dimitrios Tzovaras,et al.  Behavioural Network Traffic Analytics for Securing 5G Networks , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[9]  Qinghe Du,et al.  Social-Aware D2D Relay Networks for Stability Enhancement: An Optimal Stopping Approach , 2018, IEEE Transactions on Vehicular Technology.

[10]  Aman Gupta,et al.  Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[11]  Carles Antón-Haro,et al.  5G Mobile Cellular Networks: Enabling Distributed State Estimation for Smart Grids , 2017, IEEE Communications Magazine.

[12]  Susana Sargento,et al.  Enabling Cyber-Physical Systems for 5G Networking: A Case Study on the Automotive Vertical Domain , 2018, 2018 IEEE/ACM 4th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).

[13]  Pinyi Ren,et al.  Deep Learning-Based Big Data-Assisted Anomaly Detection in Cellular Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[14]  Songwu Lu,et al.  New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks , 2016, CCS.

[15]  Masood Khosroshahy,et al.  Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[16]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[17]  Dimitrios Tzovaras,et al.  A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks , 2016, IEEE Transactions on Mobile Computing.

[18]  Quoc V. Le,et al.  Searching for Activation Functions , 2018, arXiv.

[19]  Mohammed Atiquzzaman,et al.  LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey , 2018, IEEE Access.

[20]  Daniel K. Samaan,et al.  The economics of artificial intelligence : Implications for the future of work * , 2018 .

[21]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[22]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[23]  Ayman I. Kayssi,et al.  Signaling oriented denial of service on LTE networks , 2012, MobiWac '12.

[24]  Georges Kaddoum,et al.  Survey on Threats and Attacks on Mobile Networks , 2016, IEEE Access.

[25]  Marco De Nadai,et al.  A multi-source dataset of urban life in the city of Milan and the Province of Trentino , 2015, Scientific Data.

[26]  Gerald Kunzmann,et al.  Understanding mobile Internet usage behavior , 2014, 2014 IFIP Networking Conference.

[27]  Juergen Jasperneite,et al.  The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 , 2017, IEEE Industrial Electronics Magazine.

[28]  Moses Garuba,et al.  Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network , 2017, IEEE Transactions on Industrial Informatics.

[29]  Roger Piqueras Jover,et al.  Anomaly detection in cellular Machine-to-Machine communications , 2013, 2013 IEEE International Conference on Communications (ICC).

[30]  Sabina Jeschke,et al.  Industrial Internet of Things: Cybermanufacturing Systems , 2016 .

[31]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.