Intrusion Detection in Green Internet of Things: A Deep Deterministic Policy Gradient-Based Algorithm

Internet of Things (IoT) is an expanded application of Internet, which are used to provide various services for users. Up to now, IoTs have received more attention, because it can provide ubiquitous connectivity for various devices. With the development of IoTs, its security has become a main issue. Attackers use various techniques to implement cyber attacks for the IoT, which threats the users’ privacy seriously. As a security mechanism, intrusion detection techniques can detect various illicit behaviors before attackers invade the network. An intrusion detection system can implement effective defense functions to keep the network away from attacks. This paper proposes an intrusion detection algorithm based on deep reinforcement learning, which pursued the trends of traffic flows by extracting statistical features of prior network traffic for traffic prediction at first. Then, we use traffic predictors to employ intrusion detection. The evaluations verify the effectiveness of our algorithm in detecting Distributed Denial of Service attacks (DDoS).

[1]  Mohsen Guizani,et al.  Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach , 2022, IEEE Transactions on Mobile Computing.

[2]  Zhaolong Ning,et al.  Data-Driven Intrusion Detection for Intelligent Internet of Vehicles: A Deep Convolutional Neural Network-Based Method , 2020, IEEE Transactions on Network Science and Engineering.

[3]  Weifa Liang,et al.  Green Data-Collection From Geo-Distributed IoT Networks Through Low-Earth-Orbit Satellites , 2019, IEEE Transactions on Green Communications and Networking.

[4]  Zhen Xu,et al.  ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries , 2020, IEEE Transactions on Industrial Informatics.

[5]  S. Mercy Shalinie,et al.  Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture , 2020, IEEE Internet of Things Journal.

[6]  C. L. Philip Chen,et al.  Fuzzy Restricted Boltzmann Machine for the Enhancement of Deep Learning , 2015, IEEE Transactions on Fuzzy Systems.

[7]  Haipeng Yao,et al.  Blockchain-Based Hierarchical Trust Networking for JointCloud , 2020, IEEE Internet of Things Journal.

[8]  David K. Y. Yau,et al.  You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers , 2005, IEEE Transactions on Parallel and Distributed Systems.

[9]  Peter Bodorik,et al.  DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark , 2019, IEEE Transactions on Network and Service Management.

[10]  Wei Wang,et al.  A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Angelos D. Keromytis,et al.  SOS: an architecture for mitigating DDoS attacks , 2004, IEEE Journal on Selected Areas in Communications.

[12]  Ali A. Ghorbani,et al.  Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy , 2019, 2019 International Carnahan Conference on Security Technology (ICCST).

[13]  Jun Zhao,et al.  Artificial-Intelligence-Enabled Intelligent 6G Networks , 2019, IEEE Network.

[14]  Albert Y. Zomaya,et al.  A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.

[15]  Yuval Tassa,et al.  Continuous control with deep reinforcement learning , 2015, ICLR.

[16]  Tie Qiu,et al.  Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical Things: A Decentralized Game Theoretic Approach , 2021, IEEE Journal on Selected Areas in Communications.

[17]  Mohammad S. Obaidat,et al.  A Reinforcement Learning-Based Network Traffic Prediction Mechanism in Intelligent Internet of Things , 2021, IEEE Transactions on Industrial Informatics.

[18]  Bin Hu,et al.  Joint Computing and Caching in 5G-Envisioned Internet of Vehicles: A Deep Reinforcement Learning-Based Traffic Control System , 2020, IEEE Transactions on Intelligent Transportation Systems.

[19]  Lei Guo,et al.  Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach , 2021, Science China Information Sciences.

[20]  Victor C. M. Leung,et al.  Partial Computation Offloading and Adaptive Task Scheduling for 5G-Enabled Vehicular Networks , 2022, IEEE Transactions on Mobile Computing.

[21]  Gui Yun Tian,et al.  Multi-objective-based feature selection for DDoS attack detection in IoT networks , 2020, IET Networks.

[22]  Chao Wang,et al.  DDoS Attack Detection Using Flow Entropy and Clustering Technique , 2015, 2015 11th International Conference on Computational Intelligence and Security (CIS).

[23]  Jun Zhao,et al.  Deep Reinforcement Learning-Based Intelligent Reflecting Surface for Secure Wireless Communications , 2020, IEEE Transactions on Wireless Communications.

[24]  Milos Prvulovic,et al.  REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals , 2020, IEEE Transactions on Computers.

[25]  Zhetao Li,et al.  Minimizing Convergecast Time and Energy Consumption in Green Internet of Things , 2020, IEEE Transactions on Emerging Topics in Computing.

[26]  Keqin Li,et al.  Graphene-Grid Deployment in Energy Harvesting Cooperative Wireless Sensor Networks for Green IoT , 2019, IEEE Transactions on Industrial Informatics.

[27]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.