Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT

Published: 01 June 2023 Publication History

Abstract

The Internet of Things (IoT) has undergone rapid popularization, reaching a wide range of application domains, such as manufactures. Hence, more and more heterogeneous IoT devices have been deployed in a variety of industrial environments, progressively becoming common objects to the supply chain. The physical infrastructure of manufacturing systems has become complex and requires efficient and dynamic solutions for managing network performance and security. Network Function Virtualization (NFV) has attracted attention when the intention is to respond to security threats on Industrial IoT (IIoT). Few works use NFV to detect and mitigate security threats on IIoT networks, but even less consider performance indicators of the network context when placing the Virtual Network Functions (VNFs). Thus, this work introduces a Machine Learning (ML) approach to place security VNFs based on NFV performance to mitigate Distributed Denial of Service (DDoS) attacks on IIoT. Experiments considering a new composed data set and diverse ML techniques show ML classification as an alternative for IIoT scenarios, achieving, according to the best-performing technique, 99.40% of accuracy in relation to the ideal placement. To facilitate the reproduction of the work, all the code and data produced are publicly available.

References

[1]
M. D. V. D. da Silva, A. Rocha, R. L. Gomes, and M. Nogueira, “Lightweight data compression for low energy consumption in Industrial Internet of Things,” in Proc. IEEE CCNC, 2021, pp. 1–2.
[2]
D. M. Batista, A. Goldman, R. Hirata, F. Kon, F. M. Costa, and M. Endler, “InterSCity: Addressing future Internet research challenges for smart cities,” in Proc. 7th NoF, 2016, pp. 1–6.
[3]
D. Rosário, Z. Zhao, A. Santos, T. Braun, and E. Cerqueira, “A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications,” Comput. Commun., vol. 45, pp. 21–31, Jun. 2014.
[4]
J. Cui, F. Wang, Q. Zhang, C. Gu, and H. Zhong, “Efficient batch authentication scheme based on edge computing in IIoT,” IEEE Trans. Netw. Service Manag., vol. 20, no. 1, pp. 357–368, Mar. 2023.
[5]
I. Alamet al., “A survey of network virtualization techniques for Internet of Things using SDN and NFV,” ACM Comput. Surveys, vol. 53, no. 2, pp. 1–40, 2020.
[6]
Z. Chi, Y. Li, H. Sun, Y. Yao, and T. Zhu, “Concurrent cross-technology communication among heterogeneous IoT devices,” IEEE/ACM Trans. Netw., vol. 27, no. 3, pp. 932–947, Jun. 2019.
[7]
F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella, “IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 8182–8201, Oct. 2019.
[8]
H. Griffioen and C. Doerr, “Examining Mirai’s battle over the Internet of Things,” in Proc. ACM SIGSAC Conf. Comput. Commun. Security (CCS), 2020, pp. 743–756.
[9]
Kaspersky. “Almost 30% of companies using IoT have experienced security incidents.” 2020. [Online]. Available: https://www.kaspersky.com.br/blog/empresas-iot-seguranca-dicas/14869
[10]
CheckPoint. “Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa.” 2020. [Online]. Available: https://research.checkpoint.com/2020/amazons-alexa-hacked
[11]
I. Farris, T. Taleb, Y. Khettab, and J. Song, “A survey on emerging SDN and NFV security mechanisms for IoT systems,” IEEE Commun. Surveys Tuts., vol. 21, no. 1, pp. 812–837, 1st Quart., 2019.
[12]
A. Laghrissi and T. Taleb, “A survey on the placement of virtual resources and virtual network functions,” IEEE Commun. Surveys Tuts., vol. 21, no. 2, pp. 1409–1434, 2nd Quart., 2019.
[13]
R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. D. Turck, and R. Boutaba, “Network function Virtualization: State-of-the-art and research challenges,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 236–262, 1st Quart., 2016.
[14]
L. Gupta, T. Salman, M. Zolanvari, A. Erbad, and R. Jain, “Fault and performance management in multi-cloud virtual network services using AI: A tutorial and a case study,” Comput. Netw., vol. 165, Dec. 2019, Art. no.
[15]
W. Zhang, J. Hwang, S. Rajagopalan, K. Ramakrishnan, and T. Wood, “Performance management challenges for virtual network functions,” in Proc. IEEE NetSoft Conf. Workshops, 2016, pp. 20–23.
[16]
G. W. de Oliveiraet al., “Predicting response time in SDN-fog environments for IIoT applications,” in Proc. IEEE LATINCOM, 2021, pp. 1–6.
[17]
N. Moustafa “.The Bot-IoT dataset.” 2019. [Online]. Available: https://ieee-dataport.org/documents/bot-iot-dataset
[18]
ETSI. “Network functions virtualisation (NFV): NFV performance & portability best practises.” 2014. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/NFV-PER/001_099/001/01.01.01_60/gs_NFV-PER001v010101p.pdf
[19]
ETSI. “Network functions virtualisation (NFV): Service quality metrics.” 2014. [Online]. Available: https://www.etsi.org/deliver/etsi_gs/NFV-INF/001_099/010/01.01.01_60/gs_NFV-INF010v010101p.pdf
[20]
IETF. “Benchmarking methodology for virtualization network performance.” 2017. [Online]. Available: https://tools.ietf.org/id/draft-huang-bmwg-virtual-network-performance-03.html
[21]
T. Kim, T. Koo, and E. Paik, “SDN and NFV benchmarking for performance and reliability,” in Proc. APNOMS, 2015, pp. 600–603.
[22]
IETF. “RFC 8172: Considerations for benchmarking virtual network functions and their infrastructure,” 2017. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc8172
[23]
A. M. Zarca, J. B. Bernabe, I. Farris, Y. Khettab, T. Taleb, and A. Skarmeta, “Enhancing IoT security through network softwarization and virtual security appliances,” Int. J. Netw. Manag., vol. 28, no. 5, 2018, Art. no.
[24]
I. Farriset al., “Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems,” in Proc. IEEE CSCN, 2017, pp. 169–174.
[25]
A. M. Zarca, D. Garcia-Carrillo, J. B. Bernabe, J. Ortiz, R. Marin-Perez, and A. Skarmeta, “Enabling virtual AAA management in SDN-based IoT networks,” Sensors, vol. 19, no. 2, p. 295, 2019.
[26]
A. M. Zarcaet al., “Security management architecture for NFV/SDN-aware IoT systems,” IEEE Internet Things J., vol. 6, no. 5, pp. 8005–8020, Oct. 2019.
[27]
M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, “A machine learning security framework for IoT systems,” IEEE Access, vol. 8, pp. 114066–114077, 2020.
[28]
A. M. Zarca, J. B. Bernabe, A. Skarmeta, and J. M. A. Calero, “Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks,” IEEE J. Sel. Areas Commun., vol. 38, no. 6, pp. 1262–1277, Oct. 2020.
[29]
R. Sairam, S. S. Bhunia, V. Thangavelu, and M. Gurusamy, “NETRA: Enhancing IoT security using NFV-based edge traffic analysis,” IEEE Sensors J., vol. 19, no. 12, pp. 4660–4671, Jun. 2019.
[30]
A. Boudi, I. Farris, M. Bagaa, and T. Taleb, “Assessing lightweight virtualization for security-as-a-service at the network edge,” IEICE Trans. Commun., vol. E102-B, no. 5, pp. 970–977, 2019.
[31]
N. Guizani and A. Ghafoor, “A network function virtualization system for detecting malware in large IoT based networks,” IEEE J. Sel. Areas Commun., vol. 38, no. 6, pp. 1218–1228, Jun. 2020.
[32]
L. Zhou, H. Guo, and G. Deng, “A fog computing based approach to DDoS mitigation in IIoT systems,” Comput. Security, vol. 85, pp. 51–62, Aug. 2019.
[33]
M. Al-Shaboti, I. Welch, A. Chen, and M. A. Mahmood, “Towards secure smart home IoT: Manufacturer and user network access control framework,” in Proc. IEEE 32nd AINA, 2018, pp. 892–899.
[34]
S. K. Moghaddam, R. Buyya, and K. Ramamohanarao, “Performance-aware management of cloud resources: A taxonomy and future directions,” ACM Comput. Surveys, vol. 52, no. 4, pp. 1–37, Aug. 2019.
[35]
R. Jain, The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. Hoboken, NJ, USA: Wiley, 1991.
[36]
S. Bhulai, S. Sivasubramanian, R. van der Mei, and M. van Steen, “Modeling and predicting end-to-end response times in multi-tier Internet applications,” in Managing Traffic Performance in Converged Networks, L. Mason, T. Drwiega, and J. Yan, Eds. Berlin, Germany: Springer, 2007, pp. 519–532. [Online]. Available: https://doi.org/10.1007/978-3-540-72990-7_47
[37]
S. Yang, F. Li, S. Trajanovski, X. Chen, Y. Wang, and X. Fu, “Delay-aware virtual network function placement and routing in edge clouds,” IEEE Trans. Mobile Comput., vol. 20, no. 2, pp. 445–459, Feb. 2021.
[38]
S. Song, C. Lee, H. Cho, G. Lim, and J.-M. Chung, “Clustered Virtualized network functions resource allocation based on context-aware grouping in 5G edge networks,” IEEE Trans. Mobile Comput., vol. 19, no. 5, pp. 1072–1083, May 2020.
[39]
Y.-Y. Shih, H.-P. Lin, A.-C. Pang, C.-C. Chuang, and C.-T. Chou, “An NFV-based service framework for IoT applications in edge computing environments,” IEEE Trans. Netw. Service Manag., vol. 16, no. 4, pp. 1419–1434, Dec. 2019.

Cited By

View all
  • (2024)Optimal Task Scheduling and Resource Allocation for Self-Powered Sensors in Internet of Things: An Energy Efficient ApproachIEEE Transactions on Network and Service Management10.1109/TNSM.2024.342025421:4(4410-4420)Online publication date: 27-Jun-2024
  • (2024)Review and analysis of recent advances in intelligent network softwarization for the Internet of ThingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110215241:COnline publication date: 1-Mar-2024
  • (2023)Techniques for Enhancing Security in Industrial Control SystemsACM Transactions on Cyber-Physical Systems10.1145/36301038:1(1-36)Online publication date: 30-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Network and Service Management
IEEE Transactions on Network and Service Management  Volume 20, Issue 2
June 2023
1224 pages

Publisher

IEEE Press

Publication History

Published: 01 June 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Optimal Task Scheduling and Resource Allocation for Self-Powered Sensors in Internet of Things: An Energy Efficient ApproachIEEE Transactions on Network and Service Management10.1109/TNSM.2024.342025421:4(4410-4420)Online publication date: 27-Jun-2024
  • (2024)Review and analysis of recent advances in intelligent network softwarization for the Internet of ThingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110215241:COnline publication date: 1-Mar-2024
  • (2023)Techniques for Enhancing Security in Industrial Control SystemsACM Transactions on Cyber-Physical Systems10.1145/36301038:1(1-36)Online publication date: 30-Oct-2023
  • (2023)ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble ApproachWireless Personal Communications: An International Journal10.1007/s11277-023-10848-9133:3(1805-1827)Online publication date: 1-Dec-2023

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media