Enhancing Network QoS via Attack Classification Using Convolutional Recurrent Neural Networks

Jawad Alkenani, Mohsen Nickray

Abstract


Cyber-attacks and intrusions in networks refer to malicious activities that breach or damage data. These activities include direct attacks, such as denial-of-service (DoS) attacks, which overwhelm servers with requests to disrupt services. Intrusion involves unauthorized access to systems by exploiting security vulnerabilities. Malware threats like viruses and worms infect systems to steal information. Additionally, social engineering techniques deceive individuals into revealing sensitive information, while phishing relies on fake messages or websites to gather user data. To prevent these attacks, it is necessary to implement effective security strategies, such as knowing the attack class to protect the network and data. In this paper, ConvRNN (Convolutional Recurrent Neural Network) is used as a large-scale advanced model between Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) to process data containing spatial and temporal information. In addition, ConvRNN generates magical features from data through convolutional layers and serial convolution by RNN, which creates the model's ability to understand complexity, especially in security and surveillance agreements. The simulation results show that the proposed model outperforms LSTM, including precision, recall, F1 score, ROC curve, TPR, FPR, FNR, and accuracy.


Full Text:

PDF

References


Chaganti, Rajasekhar, et al. "A comprehensive review of denial-of-service attacks in the blockchain ecosystem and open challenges." IEEE Access 10 (2022): 96538-96555, doi: 10.1109/ACCESS.2022.3205019.‏

Al-Shareeda, Mahmood A., et al. "Review of prevention schemes for man-in-the-middle (MITM) attack in vehicular ad hoc networks." International Journal of Engineering and Management Research 10 (2020), doi:10.31033/ijemr.10.3.23.‏

Suleski, Tance, et al. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital health 9 (2023),doi: 10.1177/20552076231177.‏

Vazhenina, Daria, and Atsunori Kanemura. "Reducing the number of multiplications in convolutional recurrent neural networks (ConvRNNs)." Advances in Artificial Intelligence: Selected Papers from the Annual Conference of Japanese Society of Artificial Intelligence (JSAI 2019) 33. Springer International Publishing, 2020,doi: 10.1007/978-3-030-39878-1_5.‏

Bodapati, Suraj, et al. "Comparison and analysis of RNN-LSTMs and CNNs for social reviews classification." Advances in Applications of Data-Driven Computing (2021): 49-59,doi: 10.1007/978-981-33-6919-1_4.‏

Raza, Muhammad Raheel, Walayat Hussain, and José Maria Merigó. "Cloud sentiment accuracy comparison using RNN, LSTM and GRU." 2021 Innovations in intelligent systems and applications conference (ASYU). IEEE, 2021,doi: 10.1109/ASYU52992.2021.9599044.‏

Sujanthi, S., and S. Nithya Kalyani. "SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT." Wireless Personal Communications 114.3 (2020): 2135-2169, doi: 10.1007/s11277-020-07469-x.‏

Wu, Zheng, et al. "Online multimedia traffic classification from the QoS perspective using deep learning." Computer Networks 204 (2022): 108716,doi: 10.1016/j.comnet.2021.108716.‏

Li, Yang, et al. "MAFENN: Multi-agent feedback enabled neural network for wireless channel equalization." 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 2021,doi: 10.1109/GLOBECOM46510.2021.9685522.‏

Y. Geng et al., “Defending cyber–physical systems through reverse engineering-based memory sanity check,” IEEE Internet Things J., vol. 10, no. 10, pp. 8331–8347, 15 May 2023,doi: 10.1109/JIOT.2022.3200127.

P. Bhale, D. R. Chowdhury, S. Biswas, and S. Nandi, “OPTIMIST: Lightweight and transparent IDS with optimum placement strategy to mitigate mixed-rate DDoS attacks in IoT networks,” IEEE Internet Things J., vol. 10, no. 10, pp. 8357–8370, 15 May 2023,doi: 10.1109/JIOT.2023.3234530.

A. Zainudin, L. A. C. Ahakonye, R. Akter, D.-S. Kim, and J.-M. Lee, “An efficient hybrid-DNN for DDoS detection and classification in software-defined IIoT networks,” IEEE Internet Things J., vol. 10, no. 10, pp. 8491–8504, 15 May 2023,doi: 10.1109/JIOT.2022.3196942.

Y. Meidan, D. Avraham, H. Libhaber, and A. Shabtai, “CADeSH: Collaborative anomaly detection for smart homes,” IEEE Internet Things J., vol. 10, no. 10, pp. 8514–8532, 15 May 2023,doi: 10.1109/JIOT.2022.3194813.

T. V. Khoa et al., “Deep transfer learning: A novel collaborative learning model for cyberattack detection systems in IoT networks,” IEEE Internet Things J., vol. 10, no. 10, pp. 8578–8589, 15 May 2023,doi: 10.1109/JIOT.2022.3202029.

J. Fan, K. Wu, Y. Zhou, Z. Zhao, and S. Huang, “Fast model update for IoT traffic anomaly detection with machine unlearning,” IEEE Internet Things J., vol. 10, no. 10, pp. 8590–8602, 15 May 2023,doi: 10.1109/JIOT.2022.3214840.

R. Zhao, Y. Wang, Z. Xue, T. Ohtsuki, B. Adebisi, and G. Gui, “Semi-supervised federated-learning-based intrusion detection method for Internet of Things,” IEEE Internet Things J., vol. 10, no. 10, pp. 8645–8657, 15 May 2023,doi: 10.1109/JIOT.2022.3175918.

Dawoud, A.; Sianaki, O.A.; Shahristani, S.; Raun, C. Internet of Things Intrusion Detection: A Deep Learning Approach. In Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, ACT, Australia, 1–4 December 2020; pp. 1516–1522,doi: 10.1109/SSCI47803.2020.9308293.

Roy, B.; Cheung, H. A Deep Learning Approach for Intrusion Detection in the Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network. In Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, NSW, Australia, 21–23 November 2018; pp. 1–6,doi: 10.1109/ATNAC.2018.8615294.

George, Anjith, and Sébastien Marcel. "Learning one class representations for face presentation attack detection using multi-channel convolutional neural networks." IEEE Transactions on Information Forensics and Security 16 (2020): 361-375,doi: 10.1109/TIFS.2020.3013214.‏

Gaur, Vimal, et al. "Multiclass classification for DDoS attacks using LSTM time-series model." (2022): 135-141,doi: 10.1049/icp.2022.0605.‏

Ring, Markus, et al. "Technical Report CIDDS-001 data set." J Inf Warfare 13 (2017).‏




DOI: https://doi.org/10.31449/inf.v49i2.7637

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.