Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3701100.3701159acmotherconferencesArticle/Chapter ViewAbstractPublication PagesadmitConference Proceedingsconference-collections
research-article

DDoS Attack Detection Based on Differential Privacy Graph Data Protection in IoV

Published: 28 January 2025 Publication History

Abstract

With IoV’s rapid growth and widespread use, securing it has become a key focus in scholarly research. In vehicle networking, DDoS attacks are prevalent and impactful. Existing deep learning methods for DDoS detection in IoV often yield superior results. However, these methods typically analyze individual flows, neglecting flow relationships and resulting in poor robustness. In addition, given the sensitivity of communication data containing substantial information, ensuring its security is imperative. This study proposes a DDoS detection method for IoV based on differential privacy graph data protection. The method detects whether a DDoS attack occurs by capturing vehicle networking communication flows and analyzing their relationships. We also employ the differential privacy technique based on attribute importance and feature relevance to protect IoV graph data at varying privacy levels. It is proved through experiments that the method can have the ability to get high accuracy of attack detection while ensuring privacy.

References

[1]
Adel Abusitta, Martine Bellaiche, and Michel Dagenais. 2018. An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. J. Cloud Comput. 7, 9, Article 109 (Dec. 2018), 18 pages.
[2]
Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta. 2020. Decision Tree and Neural Network Based Hybrid Algorithm for Detecting and Preventing Ddos Attacks in VANETS. International Journal of Innovative Technology and Exploring Engineering 9, 5 (March 2020), 669–675.
[3]
P.K. Agrawal, B.B. Gupta, and Satbir Jain. 2011. SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack. In 2011 European Intelligence and Security Informatics Conference. IEEE, Athens, Greece, 178–182.
[4]
Pooja Bansal, Shabnam Sharma, and Aditya Prakash. 2015. A Novel approach for Detection of Distributed Denial of Service attack in VANET. International Journal of Computer Applications 120, 5 (June 2015), 28–32.
[5]
Abdullah Emir Cil, Kazim Yildiz, and Ali Buldu. 2021. Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications 169, 4 (Dec. 2021), 114520.
[6]
Sergiu Costea, Marian Barbu, and Razvan Rughinis. 2013. Qualitative analysis of differential privacy applied over graph structures. In 2013 11th RoEduNet International Conference. IEEE, Sinaia, Romania, 1–4.
[7]
Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation. Springer Berlin Heidelberg, Heidelberg, Berlin, 1–19.
[8]
Usha Devi Gandhi and R.V.S.M Keerthana. 2014. Request Response Detection Algorithm for detecting DoS attack in VANET. In 2014 International Conference on Reliability Optimization and Information Technology (ICROIT). IEEE, Faridabad, India, 192–194.
[9]
Xun Jian, Yue Wang, and Lei Chen. 2023. Publishing Graphs Under Node Differential Privacy. IEEE Transactions on Knowledge and Data Engineering 35, 4 (April 2023), 4164–4177.
[10]
Yuzhen Li, Renjie Li, Zhou Zhou, Jiang Guo, Wei Yang, Meijie Du, and Qingyun Liu. 2022. GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks. In 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, Hangzhou, China, 1275–1280.
[11]
Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, and Marius Portmann. 2022. E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium. IEEE, Budapest, Hungary, 1–9.
[12]
Jieru Mu, Hua He, Lin Li, Shanchen Pang, and Cong Liu. 2022. A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism. In Frontiers in Cyber Security. Springer Singapore, Singapore, 214–229.
[13]
Tamara T. Mueller, Johannes C. Paetzold, Chinmay Prabhakar, Dmitrii Usynin, Daniel Rueckert, and Georgios Kaissis. 2023. Differentially Private Graph Neural Networks for Whole-Graph Classification. IEEE Transactions on Pattern Analysis and Machine Intelligence 45, 6 (June 2023), 7308–7318.
[14]
Ayonija Pathre, Chetan Agrawal, and Anurag Jain. 2013. IDENTIFICATION OF MALICIOUS VEHICLE IN VANET ENVIRONMENT FROM DDOS ATTACK. Journal of Global Research in Computer Sciences 4, 6 (June 2013), 30–34. https://api.semanticscholar.org/CorpusID:56301491
[15]
Kanwal Rashid, Yousaf Saeed, Abid Ali, Faisal Jamil, Reem Alkanhel, and Ammar Muthanna. 2023. An Adaptive Real-Time Malicious Node Detection Framework Using Machine Learning in Vehicular Ad-Hoc Networks (VANETs). Sensors 23, 5 (Feb. 2023).
[16]
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, Daniel Jungels, and Jean pierre Hubaux. 2007. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Journal on Selected Areas in Communications 25, 8 (Oct. 2007), 1557–1568.
[17]
Munazza Shabbir, Muazzam A. Khan, Umair Shafiq Khan, and Nazar A. Saqib. 2016. Detection and Prevention of Distributed Denial of Service Attacks in VANETs. In 2016 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, Las Vegas, NV, USA, 970–974.
[18]
Surbhi Sharma and Baijnath Kaushik. 2019. A survey on internet of vehicles: Applications, security issues & solutions. Vehicular Communications 20 (Dec. 2019), 100182.
[19]
Hafiz Husnain Raza Sherazi, Razi Iqbal, Farooq Ahmad, Zuhaib Ashfaq Khan, and Muhammad Hasanain Chaudary. 2019. DDoS attack detection: A key enabler for sustainable communication in internet of vehicles. Sustainable Computing: Informatics and Systems 23 (2019), 13–20.
[20]
Qingqing Ye, Haibo Hu, Man Ho Au, Xiaofeng Meng, and Xiaokui Xiao. 2022. LF-GDPR: A Framework for Estimating Graph Metrics With Local Differential Privacy. IEEE Transactions on Knowledge and Data Engineering 34, 10 (Oct. 2022), 4905–4920.
[21]
C. Yi, Y. Wu, Z. Qian, Z. Sun, and W. Wang. 2018. DDoS attack detection and defense based on hybrid deep learning model in SDN. Tongxin Xuebao/Journal on Communications 39, 7 (July 2018), 176–187.
[22]
Yiping Yin, Qing Liao, Yang Liu, and Ruifeng Xu. 2019. Structural-Based Graph Publishing Under Differential Privacy. In Cognitive Computing – ICCC 2019. Springer International Publishing, Cham, 67–78.

Index Terms

  1. DDoS Attack Detection Based on Differential Privacy Graph Data Protection in IoV

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ADMIT '24: Proceedings of the 2024 3rd International Conference on Algorithms, Data Mining, and Information Technology
    September 2024
    432 pages
    ISBN:9798400718120
    DOI:10.1145/3701100
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 January 2025

    Check for updates

    Author Tags

    1. IoV
    2. DDoS
    3. Detection
    4. Graph
    5. Differential Privacy

    Qualifiers

    • Research-article

    Conference

    ADMIT 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 1
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 30 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media