A Generalized Renyi Joint Entropy Method for the Detection of DDoS Attacks in IoT

Main Article Content

Jeethu Mathew
Jemima Priyadarsini R

Abstract

Internet of things connects all the smart devices with internet and gain more information in comparison with other systems. Since different types of objects are connected, privacy and security of the users must be ensured. Because of the decentralised nature, IoT is prone to different types of attacks which are either active or passive. Since internet is the main part of IoT, the security issues present in Internet will be available in the Internet of Things too. Distributed denial of service is a major threat of this type and a critical threat. It reduces the performance of the complete network even it breaks entire communication. For this reason many researches have been made in this area to detect Distributed Denial of Service attack. Entropy-based approaches to identify DDoS attacks in the internet of things are discussed in this research. This new approach is based on the GRJE method, which stands for generalised Renyi joint entropy. Renyi joint entropy is used in the suggested approach to analyse network traffic flow. The suggested method is put into practise and evaluated against other methods based on a few factors.  Results from an analysis of the suggested system's effectiveness in NS2 are reported in this study.

Article Details

How to Cite
Mathew, J. ., & Priyadarsini R, J. . (2023). A Generalized Renyi Joint Entropy Method for the Detection of DDoS Attacks in IoT. International Journal on Recent and Innovation Trends in Computing and Communication, 11(6), 248–252. https://doi.org/10.17762/ijritcc.v11i6.7559
Section
Articles

References

A. Zanella , N. Bui, A. Castellani, L. Vangelista, & M. Zorzi, “Internet of things for smart cities”, IEEE Internet of Things Journal, Vol.1, Issue 1, pp. 30–34, 2014.

J. Mathew, R. J. Priyadarsini, “A Review on DoS Attack on IoT”, Solid State Technology, Vol. 63, Issue. 4, pp. 8000-8009, 2020.

L. Liang, K. Zheng, Q. Sheng, & X. Huang, “A denial of service attack method for an IoT system”, 8th international conference on information technology in medicine and education, Vol. 5, pp. 1–3, 2016.

S. Kajwadkar, and K. J. Vinod, "A Novel Algorithm for DoS and DDoS Attack Detection in Internet of Things.", 2018 Conference on Information and Communication Technology (CICT), IEEE, 2018.

P. Redekar, and C. Madhumita, "A Novel Hybrid Approach for Detection of DDoS Attack.", International Conference on Intelligent Data Communication Technologies and Internet of Things. Springer, Cham, 2018.

V. S. Reddy, K. D. Rao, and P. S. Lakshmi, "Efficient detection of DDoS attacks by entropy variation." IOSR Journal of Computer Engineering, Vol 7,Issue. 1, pp.13-18, 2012.

A. Gaurav, et al. "Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices", 2021 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2021.

U. Kumar, et al. "Isolation of DDoS attack in IoT: A new perspective." Wireless Personal Communications, Vol. 114, pp. 2493-2510, 2020.

P. Berezi?ski, J Bartosz, and S. Marcin, "An entropy-based network anomaly detection method." Entropy, Vol. 17, Issue.4, pp.2367-2408, 2015.

X. Wang, et al. "DDoS Attack Detection Algorithm Based on IP Entropy Model.", Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference, pp.179-182, 2015.

A. Bhandari, A. L. Sangal, and K. Krishan K, "Destination address entropy based detection and traceback approach against distributed denial of service attacks", International Journal of Computer Network and Information Security, Vol 7, Issue. 8, pp. 9-20, 2015.

S. M. Mousavi, and M. St-Hilaire, "Early detection of DDoS attacks against SDN controllers", 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2015.

Kim, H. ., Jeong, Y. ., Seo, S. ., Youn, J. ., & Lee, D. (2023). A Study on Radiant Heat Application to the Curing Process for Improvement of Free-Form Concrete Panel Productivity. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 157–164. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2583

M. Aladaileh, et al. "Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller", CMC-COMPUTERS MATERIALS & CONTINUA, Vol. 69, Issue. 1, pp. 373-391, 2021.

Martínez, L., Mili?, M., Popova, E., Smit, S., & Goldberg, R. Machine Learning Approaches for Human Activity Recognition. Kuwait Journal of Machine Learning, 1(4). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/146

S. M. Mousavi, and M. St-Hilaire. "Early detection of DDoS attacks against SDN controllers." 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2015.

A. Gaurav, et al. "Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices." 2021 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2021.

S. Kajwadkar, and K. J. Vinod, "A novel algorithm for DoS and DDoS attack detection in internet of things", 2018 Conference on Information and Communication Technology (CICT), IEEE, 2018.