Secured Federated Learning for DDoS Detection in Heterogenous Telecom Cloud Networks Using Recurrent Neural Networks

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 12
Year of Publication : 2023
Authors : Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji
pdf
How to Cite?

Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji, "Secured Federated Learning for DDoS Detection in Heterogenous Telecom Cloud Networks Using Recurrent Neural Networks," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 12, pp. 54-64, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I12P106

Abstract:

The recent evolution of cloud computing has enabled the cloudification of Telecommunication (Telecom) network functions. The cloud-based Telecom infrastructure is more scalable, flexible, and cost-efficient for service providers. However, a significant security challenge for Telecom cloud providers is ensuring the availability of services provided to users by mitigating Distributed Denial of Service (DDoS) attacks. The fact that Virtual Network Functions (VNF) in the Telecom cloud are hosted on the Internet makes them easy targets for large-scale DDoS attacks. This study proposes the use of secured supervised Federated Learning (FL) with an efficient Hybrid Recurrent Neural Network (H-RNN) for DDOS attack mitigation in the Telecom cloud. The proposed H-RNN model combines LSTM, a Bidirectional GRU (BiGRU), and a Bidirectional LSTM (BiLSTM) to obtain a state-of-the-art LSTM+BiGRU+BiLSTM model. FL is used with Secure Sockets Layer (SSL) encryption, which supports data privacy and integrity in heterogeneous Telecom cloud networks. The simulation results using the CICDDOS2019 benchmark dataset displayed a detection accuracy of 99.59%, a False Positive Rate (FPR) of 0.042%, and an average detection time of 0.062 ms. A novel H-RNN model and secured FL are proposed to enable deep-learning-based anti-DDoS technology building and deployment in cloud-based Telecom networks.

Keywords:

DDoS attack mitigation, Deep Learning, Federated Learning, SSL, Telecom cloud.

References:

[1] Kasim Oztoprak, Yusuf Kursat Tuncel, and Ismail Butun, “Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum,” Sensors, vol. 23, no. 2, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] QingYun Meng et al., “An Automatic Integration Deployment Framework for Telecom Cloud Network,” 2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Beijing, China, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Anil Kumar Rangsietti, and Siva Sairam Prasad Kodali, “SDN-Enabled Network Virtualization and Its Applications,” Software Defined Networks: Architecture and Applications, John Wiley & Sons, Ltd, pp. 231–277, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] A.L. Zubilevich, S.A. Sidnev, and V.A. Tsarenko, “Service Level Agreement with Differentiated Reliability Requirements : Effi ciency of Application in Communication Networks and On-Board Systems,” 2022 Systems of Signals Generating and Processing in the Field of on Board Communications, Moscow, Russian Federation, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Kibeom Park et al., “Technology Trends and Challenges in SDN and Service Assurance for End-to-End Network Slicing,” Computer Networks, vol. 234, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Céline Gicquel, Sonia Vanier, and Alexandros Papadimitriou, “Optimal Deployment of Virtual Network Functions for Securing Telecommunication Networks against Distributed Denial of Service Attacks: A Robust Optimization Approach,” Computers and Operations Research, vol. 146, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Meenakshi Mittal, Krishan Kumar, and Sunny Behal, “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review,” Soft Computing, vol. 27, no. 18, pp. 13039-13075, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Jie Wen et al., “A Survey on Federated Learning: Challenges and Applications,” International Journal of Machine Learning and Cybernetics, vol. 14, no. 2, pp. 513-535, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Dingyang Lv et al., “DDoS Attack Detection Based on CNN and Federated Learning,” 2021 Ninth International Conference on Advanced Cloud and Big Data (CBD), Xi'an, China, pp. 236-241, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Roberto Doriguzzi-Corin, and Domenico Siracusa, “FLAD: Adaptive Federated Learning for DDoS Attack Detection,” Computers & Security, vol. 137, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Francisco Lopes de Caldas Filho et al., “Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning,” Sensors, vol. 23, no. 14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Ahmad Zainudin et al., “FedDDoS: An Efficient Federated Learning-Based DDoS Attacks Classification in SDN-Enabled IIoT Networks,” 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, pp. 1279-1283, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Zengguang Liu et al., “An Asynchronous Federated Learning Arbitration Model for Low-Rate DDoS Attack Detection,” IEEE Access, vol. 11, pp. 18448-18460, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Saeid Sheikhi, and Panos Kostakos, “DDoS Attack Detection Using Unsupervised Federated Learning for 5G Networks and Beyond,” 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Gothenburg, Sweden, pp. 442- 447, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Krzysztof Zarzycki, and Maciej Ławryńczuk, “Advanced Predictive Control for GRU and LSTM Networks,” Information Sciences, vol. 616, pp. 229-254, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Kamil Masalimov, Tagir Muslimov, and Rustem Munasypov, “Real-Time Monitoring of Parameters and Diagnostics of the Technical Condition of Small Unmanned Aerial Vehicle’s (UAV) Units Based on Deep BiGRU-CNN Models,” Drones, vol. 6, no. 11, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Daniel J. Beutel et al., “Flower: A Friendly Federated Learning Research Framework,” arXiv, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, “A Detailed Analysis of the CICIDS2017 Data Set,” Information Systems Security and Privacy, pp. 172-188, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Oussama Sbai, and Mohamed Elboukhari, “Deep Learning Intrusion Detection System for Mobile Ad Hoc Networks against Flooding Attacks,” IAES International Journal of Artificial Intelligence, vol. 11, no. 3, pp. 878-885, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] G.C. Amaizu et al., “Composite and Efficient DDoS Attack Detection Framework for B5G Networks,” Computer Networks, vol. 188, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Abdullah Emir Cil, Kazim Yildiz, and Ali Buldu, “Detection of DDoS Attacks with Feed Forward Based Deep Neural Network Model,” Expert Systems with Applications, vol. 169, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Deepak Kumar et al., “DDoS Detection Using Deep Learning,” Procedia Computer Science, vol. 218, pp. 2420-2429, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Malliga Subrmanian et al., “Evaluating the Performance of LSTM and GRU in Detection of Distributed Denial of Service Attacks Using CICDDoS2019 Dataset,” Proceedings of 7th International Conference on Harmony Search, Soft Computing and Applications, pp. 395- 406, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Juan Fernando Cañola Garcia, and Gabriel Enrique Taborda Blandon, “A Deep Learning-Based Intrusion Detection and Preventation System for Detecting and Preventing Denial-of-Service Attacks,” IEEE Access, vol. 10, pp. 83043-83060, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Euclides Carlos Pinto Neto, Sajjad Dadkhah, and Ali A. Ghorbani, “Collaborative DDoS Detection in Distributed Multi-Tenant IoT Using Federated Learning,” 2022 19th Annual International Conference on Privacy, Security & Trust (PST), Fredericton, Canada, pp. 1- 10, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Roberto Doriguzzi-Corin, and Domenico Siracusa, “FLAD: Adaptive Federated Learning for DDoS Attack Detection,” Computers & Security, vol. 137, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Muhammad Nadeem Ali et al., “Low Rate DDoS Detection Using Weighted Federated Learning in SDN Control Plane in IoT Network,” Applied Sciences, vol. 13, no. 3, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Jianhua Li et al., “FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4059-4068, 2022.
[CrossRef] [Google Scholar] [Publisher Link]