Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2023 May 14;23(10):4745. doi: 10.3390/s23104745

A Method for Detecting LDoS Attacks in SDWSN Based on Compressed Hilbert–Huang Transform and Convolutional Neural Networks

Yazhi Liu 1,2, Ding Sun 1,2, Rundong Zhang 3,*, Wei Li 1,2
Editor: Alexios Mylonas
PMCID: PMC10223685  PMID: 37430658

Abstract

Currently, Low-Rate Denial of Service (LDoS) attacks are one of the main threats faced by Software-Defined Wireless Sensor Networks (SDWSNs). This type of attack uses a lot of low-rate requests to occupy network resources and hard to detect. An efficient detection method has been proposed for LDoS attacks with the features of small signals. The non-smooth small signals generated by LDoS attacks are analyzed employing the time–frequency analysis method based on Hilbert–Huang Transform (HHT). In this paper, redundant and similar Intrinsic Mode Functions (IMFs) are removed from standard HHT to save computational resources and to eliminate modal mixing. The compressed HHT transformed one-dimensional dataflow features into two-dimensional temporal–spectral features, which are further input into a Convolutional Neural Network (CNN) to detect LDoS attacks. To evaluate the detection performance of the method, various LDoS attacks are simulated in the Network Simulator-3 (NS-3) experimental environment. The experimental results show that the method has 99.8% detection accuracy for complex and diverse LDoS attacks.

Keywords: Low-Rate Denial of Service, Software-Defined Wireless Sensor Networks, Hilbert–Huang Transform, Convolutional Neural Networks

1. Introduction

Software-Defined Wireless Sensor Networks (SDWSNs) introduce software-defined network architecture into wireless sensor networks, which equips sensor nodes and sink nodes with programmable functions in the control plane, realizing flexible control in sensor networks [1]. However, with the rapid development of SDWSNs, its security issues have also attracted increasing attention [2]. Due to the fact that the sensor nodes are low power and the wireless connections between the nodes are intermittent, based on this property of SDWSN, the Low-Rate Denial of Service (LDoS) attacks are able to launch elaborate attacks to make nodes unavailable.

Compared to Denial of Service (DoS) attacks, LDoS attacks are more harmful and more difficult to detect. Traditional DoS attacks involve a large number of data packets, which may cause anomalies in the statistical characteristics of network traffic to detect DoS traffic [3,4,5]. In contrast, LDoS attacks reduce the average network traffic, and attackers do not need to maintain a high attack rate. Instead, they periodically send the victim short burst traffics [6,7]. Therefore, a large-scale and long-term network paralysis can be caused by only a few attack packets, greatly reducing the throughput of victims. Additionally, a single LDoS attack flow disguised as a legally-formed pulse flow exhibits the same basic characteristics as normal traffic. Its average packet rate is low, 10–20% of normal data traffic, and it often submerges in normal traffic, making it difficult to be detected [8,9].

Currently, research mainly applies machine learning (ML) to extract attack traffic features in the network to detect and defend against attacks. For example, Deep Neural Network (DNN) models are highly effective in detecting attacks [10]. DNN models are trained using labeled traffic data and further used to classify traffic samples in the network. Thus, the ML approach is an appropriate choice to identify the network intrusions by acquiring traffic characteristics [11]. Due to the characteristics of LDoS attacks, traditional DNN models find it difficult to detect them [12,13,14]. However, detection methods based on the time–frequency domain can effectively identify LDoS attack features. Due to the role of Empirical Mode Decomposition (EMD), the Hilbert–Huang Transform (HHT) method in time–frequency transformations can extract the features of small-scale signals. EMD can adaptively perform time–frequency localized analysis, decompose data signals into a set of Intrinsic Mode Function (IMF) components, and extract meaningful instantaneous amplitude and frequency information [15]. However, in the process of decomposing the signal, if the signal has similar local features, which will generate similar IMF components in different decompositions, it may result in mode mixing, i.e., there may exist an overlap and a similarity between a set of IMF components [16].

Cutting-edge feature-based detection methods require significant computational resources and time for feature selection and model training, while time–frequency domain detection methods suffer from the detection of features in a small scale [17,18,19]. To fill the gap in detecting LDoS attacks using HHT-based spectral features, we propose the HCN method, which combines the Hilbert–Huang Transform and Convolutional Neural Network (CNN) methods to detect LDoS traffic. HCN optimizes the HHT with modal mixing to generate two-dimensional temporal–spectral features as the input feature vector and design a CNN model to classify attack traffic and normal traffic. The advantage of combining CNN with HHT lies in the ability of HHT on effectively capturing the time–frequency domain characteristics of LDoS traffic in the spectrum. By utilizing the advantages of deep neural networks in extracting features from two-dimensional spectrograms, CNN can extract covariant features related to data traffic from these spectrograms and classify the traffic data.

To evaluate the performance of the proposed HCN method, we used Mininet to build a network topology environment, and then carried out simulation experiments of SDWSN in NS-3. The traffic data came from the public dataset MAWI [20].

Specifically, we have made the following contributions:

  • Redundant and similar IMFs in HHT were compressed to reduce the computation complexity and solve the modal mixing problem.

  • Designed and implemented HCN, in which the compressed HHT was combined with CNN. HCN converted one-dimensional dataflow feature sequences into two-dimensional spectrogram features and then classified dataflows with CNN to improve the detection performance.

  • Our simulated network environment was driven by real data traffic. The experimental results showed that the HCN was able to achieve an accuracy of 99.8%.

The remainder of this paper is organized as follows. Section 2 presents a review of related works. Section 3 introduces the proposed HCN method and the network structure of CNN. Section 4 describes the experimental setup and shows the results. Finally, this paper is summarized in Section 5.

2. Related Work

Kuzmanovic and Knighty first found LDoS attacks, and they proposed a new type of Low-Rate TCP-directed DoS attack in 2003 [21]. Since then, many researchers have begun studying the detection of LDoS attacks.

Currently, the detection of LDoS attacks can be divided into feature-based detection and time–frequency domain detection. Yan et al. [22] extracted the mean, variance, and entropy features of TCP traffic and employed them as features to train an enhanced logistic regression model for the purpose of detecting LDoS attacks. However, the feature extraction method used in this approach was relatively weak. Liu et al. [23] proposed a method for LDoS detection that utilized multiple feature fusions. Specifically, this approach extracted features from network traffic and, subsequently, conducted further processing on these features to fit a KNN classifier. However, this approach primarily relied on the KNN classifier for the detection of attacks, which is sensitive to noise data and can be easily affected by outliers. Zhang et al. [24] employed a combination of Principal Component Analysis (PCA) and Support Vector Machine (SVM) models for attack detection. This method filtered out noise interference, extracted the principal components of TCP flow characteristics, and trained the SVM model using the extracted training set principal components. However, this approach demonstrated limited efficacy in detecting complex attack behavior, despite its simplicity and efficiency.

Dan Tang et al. [17] introduced a LDoS attack detection method that employed a multi-feature fusion approach in conjunction with CNN. This method combined 17 distinct traffic features to generate a feature map that represented the network state. This feature map was then utilized as input to train the CNN model for effective attack detection. Expanding on this approach, they also advanced a LDoS attack detection scheme utilizing a Mean Shift clustering algorithm with a weighted Euclidean distance (WEDMS). The weighting factor was determined by the significance of the features [18]. Nevertheless, it required more intricate computations and more extensive model training.

The time–frequency domain detection approach is an effective method for detecting LDoS attacks. This method involves performing time–frequency analysis on network traffic data to extract essential features such as frequency, phase, and amplitude. These features are then meticulously analyzed and processed to identify the presence of LDoS attacks [25]. Agrawal et al. [13] proposed a method that employed power spectral density analysis to identify LDoS attacks in cloud environments. This method utilized Fourier Transform (FT) to transform time-domain data to a frequency–domain spectrum and calculated the values of the power spectral density. If the power spectral density values were concentrated in the low-frequency band, the traffic will be identified as an attack. The method proposed by Yue et al. [19] was a novel approach that combined Wavelet Transform (WT) and neural networks to accurately distinguish between normal traffic and LDoS attack traffic. This method extracted wavelet energy spectral coefficients at different time scales to analyze the multiple features of traffic and used a neural network to identify LDoS attacks. Fouladi et al. [26] proposed a scheme that combined Continuous Wavelet Transform (CWT) and CNN to detect network intrusions and defenses. This approach utilized features obtained from CWT as inputs of the CNN classifier, which distinguished attack samples from normal samples. Experimental results demonstrated that this scheme had a high identification rate for DNS amplification, NTP, and TCP-SYN flood attacks.

To clearly express the characteristics of each method, we listed the above methods in a table. Table 1 is a comparative analysis of the detection methods. Feature-based methods for detecting LDoS can identify the differences between normal traffic and attack traffic through machine learning and data mining. However, the selection of features and the training of models necessitate considerable computational resources and time. Thus, it requires less complex methods or models to detect various types of LDoS attacks. The shortcomings of the detection method based on the time–frequency domain are associated with the time–frequency transform method. Fourier transforms can only be applied to periodic signals. Therefore, it cannot effectively process non-periodic signals or signals with time constraints. Moreover, the selection of an appropriate wavelet basis function is critical for improving the accuracy of detection, and this varies depending on the type of signal.

Table 1.

Summary of research status about detection methods.

Category Proposal Detection Method Limitations
Detection methods based on features Yan et al. (2019) Enhanced logistic regression [22] The feature extraction method was relatively weak.
Liu et al. (2020) KNN [23] This method was sensitive to noise data and could be easily affected by outliers.
Zhang et al. (2019) PCA-SVM [24] This approach demonstrated limited efficacy in detecting complex attack behaviors.
Tang et al. (2020) Multi-feature fusion [17] They required intricate computations and extensive model training.
WEDMS [18]
Detection methods based on time–frequency domain Agrawal et al. (2018) FT [13] FT could not effectively process non-periodic signals or signals with time constraints.
Yue et al. (2018) WT [19] WT could not achieve high time and frequency precision simultaneously, and WT required the selection of an appropriate wavelet basis function.
Fouladi et al. (2022) CWT [26]

HHT is an adaptive analysis method [27] that takes the multi-resolution analysis advantages of wavelet transforms while overcoming the difficulty in selecting wavelet basis functions. It can highlight non-stationary small signal characteristics produced by LDoS attacks and differentiate them from normal traffic. Therefore, we used HHT for time–frequency domain feature extraction to identify LDoS attacks. In HHT, similar IMF components are removed to effectively solve the mode mixing problem.

3. HCN Detection Method

In this section, we introduce the HCN detection method. The flowchart of the proposed HCN method is shown in Figure 1, and the definitions of all the symbols are shown in Table 2.

Figure 1.

Figure 1

The flowchart of the HCN detection method shows that four features are extracted from the network nodes, and then HHT is performed on these features before inputting them to the CNN.

Table 2.

List of Notations.

Notation Description
Q Feature set
t Sampling time interval
xt Feature Value
D Euclidean distance
M Euclidean distance threshold
X Feature
w Sliding window size
X(t) The feature sequence after sliding window
P The total number of packets
C Total network connections
emax(t) Local maximum points
emin(t) Local minimum points
ml The mean value between emax(t) and emin(t)
C(t) IMF component
rn Residual signal
H(ω,t) The Hilbert spectra of IMF components
ai(t) Amplitude
ωi(t) Instantaneous frequency
SQ Spectrogram after compressed HHT of Q
Nepochs Training rounds
Ntrain Training data set
Ntest Testing data set

3.1. Traffic Feature Information Extraction

For the purpose of detecting attack traffic, time series features were extracted from network nodes. We collected feature by extracting the total number of unique source IP addresses (USIP), the normalized number of total unique destination IP addresses (NUDIP), the differential packet transform rate (DPTR), and the differential network connection conversion rate (DCCR). The feature extraction followed the algorithm shown in Algorithm 1. The definitions of each feature are described in detail below:

The total number of unique source IP addresses (USIP): When the attacks are launched, the attacker sends a large number of packets with false IP addresses to attack other network nodes; thus, the value of USIP increases significantly. Therefore, USIP is adopted as the first feature to detect the attack.

The normalized number of total unique destination IP addresses (NUDIP): During the attack, the source IP addresses of the packets generated are random, but the destination IP addresses are set to the IP address of the victim node. Although the value of UDIP theoretically decreases, the change of UDIP is not obvious because other destination IP addresses also exist in the flow table. However, when normalized by the total number of packets, the value of UDIP changes significantly due to the dramatic increase in the total number of packets in the flow table. Therefore, normalized UDIP is adopted as the second feature to detect the attack.

The differential packet transform rate (DPTR): During the attack, the data packets within the network increase explosively. Thus, DPTR is applied as the third feature to detect the attack.

The differential network connection conversion rate (DCCR): Sometimes, there are elephant flows in normal traffic.The difference is that a normal elephant flow will not interrupt the connection request multiple times, whereas attack traffic will interrupt requests continuously. Therefore, DCCR is applied as the fourth feature.

The transformed two-dimensional spectrogram of these feature values can reflect the characteristic differences between normal traffic and attack traffic, which can be used to identify attack traffic.

Algorithm 1 Traffic feature information extraction.

Require: Network traffic data flow_t

Ensure: Feature set Q

 1: for  (Srcip,Desip,Pt,Ct)flow_t  do

 2:        for each time interval t do

 3:              if Srcip then

 4:                     (Srcip,count)count+1

 5:              else

 6:                     (Srcip,count)1

 7:              end if

 8:              if Desip then

 9:                     (Desip,count)count+1

 10:              else

 11:                     (Desip,count)1

 12:              end if

 13:              Pt+1PtPtDPTR

 14:              Ct+1CtCtDCCR

 15:              (Srcip,count)USIP

 16:              (Desip,count)PtNUDIP

 17:        end for

 18: end for

3.2. Compressed HHT

During the process of decomposing the signal into IMF components using the HHT method, each IMF component was considered as a local feature of the signal. In applications, different signals may have similar local features, which could result in similar IMF components after the HHT decomposition. Although similar IMF components may not necessarily be caused by mode mixing; the local similarity of the data can also lead to this situation. However, it is undesirable regardless of the situation. Therefore, we calculate the Euclidean distance between adjacent IMF components to determine their similarity, as shown in Figure 2. To prevent feature duplication and save computational resources, IMF components with high similarity are directly removed, and the calculation of the next IMF component is stopped.

Figure 2.

Figure 2

Compressed HHT. Green indicates retention, red indicates deletion, and the displayed three-dimensional plot shows the concatenated spectrogram.

3.3. Frequency–Domain Feature Extraction

During a LDoS attack, the attacker injects a large amount of data traffic into the victim network in a short period of time until the network becomes congested. The attack traffic typically appears similar to normal traffic in the time domain, but exhibits low-frequency small signals in the frequency domain. HHT can extract the frequency–domain characteristics of such non-stationary small signals, enabling attack recognition.

To detect the small signal features of LDoS in the frequency domain, a feature sequence X is extracted from feature set Q in each time interval, as illustrated in Algorithm 2. A subsequence X(t)={xt,,xt+w} is obtained from sequence X={x1,,xw,,xN} by a sliding window of length w. As attack traffic is bursty, each subsequence X(t) is non-stationary; as a result, it is difficult to find signal features in X(t). To resolve this issue, we use EMD to decompose the non-stationary time series into a set of linearly independent IMFs. Each IMF component represents the oscillations at different frequency bands of X. Then, we apply the Hilbert transform to each IMF component to obtain the instantaneous frequency and Hilbert spectrum, which include time, frequency, and amplitude component.

Algorithm 2 Frequency–Domain Feature Extraction.

Require: [X1,X2,,Xn]Q

Ensure: SQ

 1: count ← 0

 2: for Xi in Q do

 3:       for each time interval t do

 4:             Statistics (xt)

 5:             if countw then

 6:                   X(t)||xt; where || stands for concatenation.

 7:                   count++

 8:             else

 9:                   X(t)x2w||xt

 10:            end if

 11:            SX(t)HHT(X(t)); where SX(t)Rw×w

 12:       end for

 13:       SX(t)t=1,,nSQ; where SQRw×w×n

 14: end for

A cubic spline function is used to fit the maximum envelope line for all local maximum points emax(t) on the subsequence X(t). Similarly, the minimum points emin(t) are identified, and their mean values, denoted as ml, are calculated as the average of the maximum and minimum envelope lines. Subtracting ml from the subsequence X(t) creates a new sequence C(t):

C(t)=X(t)ml (1)

If C(t) satisfies the following conditions, it is the component of the first IMF [28].

  1. In a local interval of the data, the number of extreme points of a function is equal to or differs from the number of zeros by, at most, one, and these extreme points and zeros appear alternately;

  2. The average value of a function over the entire data range is zero;

  3. The frequency of a function in a local interval varies monotonically with time.

X(t)=i=1nCi(t)+rn (2)

Ci(t) represents the i-th decomposed IMF component of X(t), while rn represents the i-th residual signal. To prevent mode mixing during the decomposition process, the Euclidean distance between adjacent IMF components is calculated to determine their similarity. The Euclidean distance D between the consecutive IMF components is calculated. If D is below a certain threshold, the newly decomposed IMF component is discarded and the calculation is stopped. If it is above the threshold, the process is repeated until all the IMF components are extracted. Figure 2 illustrates the process of decomposing X(t) into IMFs employing compressed HHT.

D=Ci(t)Ci+1(t)2 (3)

Subsequently, the retained IMF components are processed with Hilbert transform to generate the Hilbert spectrum of X(t). Then, the Hilbert spectra of IMF components are concatenated together to obtain H(ω,t).

H(ω,t)=i=1nai(t)ejωi(t)dt (4)

where ai(t) and ωi(t), respectively, denote the amplitude and instantaneous frequency.

Figure 3 illustrates the transformation of the feature set Q into four sets of two-dimensional spectra SQ by compressed HHT. These four different combinations of spectral features provide a comprehensive presentation of the features and enhance the recognition ability of different features. Finally, the two-dimensional spectra are employed to train a CNN model and achieving the detection of attack traffic.

Figure 3.

Figure 3

Compressed HHT-based feature transformation. The feature sequence X is passed through by a sliding window with a step size of 1. For each extracted subsequence, a Compressed HHT is applied, resulting in four sets of spectrograms. These spectrograms are then input to a CNN model.

3.4. The HCN Model

In this paper, a CNN is constructed by using a two-layer convolutional neural network and a single max-pooling layer, which is applied twice to the input of a two-dimensional spectrum, as depicted in Figure 4. The MaxPooling layer is utilized to further reduce the dimensionality of the information extracted by the convolutional layer, thereby improving the computational efficiency and enhancing the invariance of the image features. A Dropout layer is added to the Flatten layer to prevent overfitting during training of the model. The network uses 3 × 3 kernels in each layer, and the activation function used in all layers is ReLu. In the Dropout layer, each neuron has a 0.2 probability of being deactivated. Algorithm 3 describes the process of classification decision making by the HCN model.

Algorithm 3 The HCN model for classification.

Require: SQ, two-dimensional spectrum.

Ensure: ACC, accuracy of HCN classification.

 1: for i=1,2,,Nepochs do

 2:       for t=1,2,,n do

 3:             HCN ←(SQ)tNtrain, training HCN models.

 4:             Save training parameters.

 5:       end for

 6:       for t=1,2,,n do

 7:             HCN ←(SQ)tNtest, input testing dataset to the trained HCN model.

 8:             ACC← HCN, calculating the accuracy of model judgments.

 9:       end for

 10:     Take the average of the accuracy rate of each epoch.

 11: end for

Figure 4.

Figure 4

The HCN Model.

4. Experiment

This section evaluates the performance of the HCN model in the SDWSN network. The experimental environment and the performance metrics are introduced, and the experimental results are analyzed.

4.1. The Network Topology

To evaluate the performance of the HCN model, this paper employs the Mininet simulator to establish the network topology, which is then imported into NS-3 as the simulation environment for SDWSN. The experimental topology is shown in Figure 5.

Figure 5.

Figure 5

Network Topology.

4.2. Dataset

Since 2002, the MAWI laboratory has been committed to collecting and analyzing internet traffic data and has had a significant impact in this field [20]. We regenerated the network traffic from the MAWI dataset using the TcpReplay tool and rewrote the IP addresses based on the network node IPs in our experimental topology. The regenerated traffic was then injected into the network topology. Additionally, we generated attack traffic using the Hping3 and slowhttptest tools and sent it into the network from the attacker node in the topology.

The attack traffic in this paper can be classified into three types:

  1. HTTP slow DoS attack: exhausts the resources of the target server by continuously sending incomplete or intentionally slow connection requests in order to achieve the attack purpose;

  2. ARP attack: deceives other nodes in the network by changing the destination IP address of the traffic in the network to the victim’s IP address;

  3. Flood attack: overloads the network and lowers its availability by sending a large amount of data traffic or control messages to the network.

The source IP addresses of all the attack data packets are fabricated or fake. From the victim’s perspective, the attack data packets appear to be coming from different sources. These attacks are able to push the victim into a congested state repeatedly.

This experiment generated 4 h traffic, including 1 h normal traffic and 3 h attack traffic. We used the Wireshark software to capture the network traffic in the experimental topology. The feature set Q=[X1,X2,X3,X4] was collected and extracted for each time interval of t = 1 s in the network. A subsequence set Q(t)t=113,800=[X1(t)t=113,800,X2(t)t=113,800,X3(t)t=113,800,X4(t)t=113,800] was obtained for each Xi sequence in Q by a sliding window of length w=100. Subsequently, compressed HHT was performed on each subsequence Xi(t) to obtain a three-dimensional feature spectrum. To facilitate deep learning in subsequent stages, the three-dimensional feature spectrum was projected and transformed into a two-dimensional frequency spectrum SQ, resulting in 13,800 traffic samples, each containing four two-dimensional frequency spectrum. The training dataset consisted of 8000 labeled samples, including 2000 normal traffic samples, 2000 HTTP slow DoS attack traffic samples, 2000 ARP attack traffic samples, and 2000 Flood attack traffic samples. The testing dataset included a total of 5800 samples, which consisted of normal traffic and three types of attack traffic, as shown in Figure 6. The experimental parameters are shown in Table 3.

Figure 6.

Figure 6

Number of training and testing sets for four types of traffic.

Table 3.

Parameter list.

Parameter Value
Frequency 100 HZ
Spectral resolution 64 × 64
Packets per second 200
Euclidean distance threshold M 1
Sliding window size w 100

4.3. Experiment Results

Figure 7 shows the three-dimensional spectrogram of selected traffic, while Figure 8 shows two-dimensional spectrogram of three types of attack traffic and normal traffic. The time and frequency axes are normalized in the Figure. As shown in the Figures, the two-dimensional spectrum of each traffic type exhibits a distinct pattern. The spectrograms of different flows show different characteristics in frequency distribution and amplitude distribution. At low traffic rates, the frequency distribution of the spectrogram will be concentrated in the lower frequency range. However, for high traffic, the frequency distribution will expand to a higher frequency range, and the amplitude will also increase accordingly. Therefore, the HCN model employed four types of spectrograms as classification criteria to distinguish between normal traffic and attack traffic.

Figure 7.

Figure 7

Three-dimensional spectrogram of selected traffic: (a) USIP. (b) NUDIP. (c) DPTR. (d) DCCR.

Figure 8.

Figure 8

Two-dimensional spectrogram of three types of attack traffic and normal traffic: (a) Normal. (b) HTTP slow DoS attack. (c) ARP attack. (d) Flood attack.

To evaluate the detection performance of HCN, experiments were conducted using FNr, FPr, and Accuracy as performance metrics, and compared with Multifractal [12], BP neural network [29], PSD [13], and MF-Adaboost [30]. PSD is a time–frequency domain detection method that provided 3.7% FPr and 4.9% FNr. Multifractal, BP neural network, and MF-Adaboost are ML-based detection methods. MF-Adaboost had the best detection performance, achieving 97.06% accuracy. HCN differed from these methods in that it combined time–frequency transforms with deep learning. HCN transformed the one-dimensional feature sequences into two-dimensional spectrogram features, thereby leveraging the advantages of deep neural networks in recognizing patterns in high-dimensional data spaces. According to the results presented in Table 4, the HCN method achieved low FNr and FPr rates while maintaining high accuracy. Principally, the FNr value of HCN was improved by an order of magnitude compared to the best algorithm mentioned above.

Table 4.

Comparative result.

Method FNr FPr Accuracy
Multifractal 9% 10% 91%
BP neural network 3.32% 3.89% 96.68%
PSD 4.9% 3.7% 95.1%
MF-Adaboost 2.94% 0.33% 97.06%
HCN 0.2% 0.4% 99.8%

5. Conclusions

This paper proposed a LDoS attack detection method called HCN based on HHT and CNN. The proposed method involved the extraction of the features of multiple one-dimensional data sources from the network, and these were then transformed into two-dimensional frequency spectrum features by compressed HHT. This approach enabled a more comprehensive representation of network traffic characteristics. The resulting two-dimensional frequency spectrum features were input into a CNN for LDoS attack detection. Experiments were conducted in an SDWSN environment, and the results demonstrated that the HCN method achieved high accuracy while maintaining low false positive and false negative rates. Therefore, the method proposed in this paper was able to effectively detect LDoS attacks.

Abbreviations

LDoS Low-Rate Denial of Service
SDWSN Software-Defined Wireless Sensor Network
HHT Hilbert–Huang Transform
IMF Intrinsic Mode Function
EMD Empirical Mode Decomposition
USIP The total number of unique source IP addresses
NUDIP The normalized number of total unique destination IP addresses
DPTR The differential packet transform rate
DCCR The differential network connection conversion rate

Author Contributions

Conceptualization, Y.L., W.L. and D.S.; methodology, Y.L. and D.S.; validation, Y.L., R.Z. and W.L.; formal analysis, Y.L. and W.L.; investigation, W.L.; resources, R.Z.; data curation, R.Z.; writing—original draft preparation, Y.L. and D.S.; writing—review and editing, Y.L., W.L. and D.S. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article. As our data was generated by simulations, they lack the need to be shared.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

This work was funded by the Science and Technology Project of Hebei’s Education Department (ZD2022102).

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Modieginyane K.M., Letswamotse B.B., Malekian R., Abu-Mahfouz A.M. Software defined wireless sensor networks application opportunities for efficient network management: A survey. Comput. Electr. Eng. 2018;66:274–287. doi: 10.1016/j.compeleceng.2017.02.026. [DOI] [Google Scholar]
  • 2.Gong B., Zheng G., Waqas M., Tu S., Chen S. LCDMA: Lightweight Cross-domain Mutual Identity Authentication Scheme for Internet of Things. IEEE Internet Things J. 2023 doi: 10.1109/JIOT.2023.3252051. [DOI] [Google Scholar]
  • 3.Gao J., Chai S., Zhang B., Xia Y. Research about DoS Attack against ICPS. Sensors. 2019;19:1542. doi: 10.3390/s19071542. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.De Almeida M.P., De Sousa Júnior R.T., García Villalba L.J., Kim T.H. New DoS Defense Method Based on Strong Designated Verifier Signatures. Sensors. 2018;18:2813. doi: 10.3390/s18092813. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 5.David J., Thomas C. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. Comput. Secur. 2019;82:284–295. doi: 10.1016/j.cose.2019.01.002. [DOI] [Google Scholar]
  • 6.Tang D., Wang X., Li X., Vijayakumar P., Kumar N. AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks. IEEE Trans. Dependable Secur. Comput. 2023;20:273–287. doi: 10.1109/TDSC.2021.3131531. [DOI] [Google Scholar]
  • 7.Tang D., Gao C., Li X., Liang W., Xiao S., Yang Q. A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm. IEEE Trans. Netw. Sci. Eng. 2023:1–12. doi: 10.1109/TNSE.2023.3236970. [DOI] [Google Scholar]
  • 8.Zhan S., Tang D., Man J., Dai R., Wang X. Low-Rate DoS Attacks Detection Based on MAF-ADM. Sensors. 2020;20:189. doi: 10.3390/s20010189. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9.Tang D., Wang S., Liu B., Jin W., Zhang J. GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. IEEE Trans. Serv. Comput. 2023:1–12. doi: 10.1109/TSC.2023.3266757. [DOI] [Google Scholar]
  • 10.Makuvaza A., Jat D.S., Gamundani A.M. Deep Neural Network (DNN) Solution for Real-time Detection of Distributed Denial of Service (DDoS) Attacks in Software Defined Networks (SDNs) SN Comput. Sci. 2021;2:107. doi: 10.1007/s42979-021-00467-1. [DOI] [Google Scholar]
  • 11.Waqas M., Tu S., Halim Z., Rehman S.U., Abbas G., Abbas Z. The Role of Artificial Intelligence and Machine Learning in Wireless Networks Security: Principle, Practice and Challenges. Artif. Intell. Rev. 2022;55:5215–5261. doi: 10.1007/s10462-022-10143-2. [DOI] [Google Scholar]
  • 12.Wu Z., Zhang L., Yue M. Low-Rate DoS Attacks Detection Based on Network Multifractal. IEEE Trans. Dependable Secur. Comput. 2016;13:559–567. doi: 10.1109/TDSC.2015.2443807. [DOI] [Google Scholar]
  • 13.Agrawal N., Tapaswi S. Low rate cloud DDoS attack defense method based on power spectral density analysis. Inf. Process. Lett. 2018;138:44–50. doi: 10.1016/j.ipl.2018.06.001. [DOI] [Google Scholar]
  • 14.Marnerides A.K., Pezaros D.P., Kim H.C., Hutchison D. Internet traffic classification using energy time-frequency distributions; Proceedings of the 2013 IEEE International Conference on Communications (ICC); Budapest, Hungary. 9–13 June 2013; pp. 2513–2518. [Google Scholar]
  • 15.Yazdani A., Salimi M., Roshan-Miavagi A. Wavelet-Hilbert transform-based simulation of pulse-like ground motion. J. Seismol. 2022;26:949–965. doi: 10.1007/s10950-022-10100-0. [DOI] [Google Scholar]
  • 16.Chen H., Liu M., Zhongchuan F. Using Improved Hilbert–Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network. Wirel. Pers. Commun. 2018;104:595–615. doi: 10.1007/s11277-018-6036-3. [DOI] [Google Scholar]
  • 17.Tang D., Tang L., Shi W., Zhan S., Yang Q. MF-CNN: A New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN. Mob. Netw. Appl. 2020;26:1705–1722. doi: 10.1007/s11036-019-01506-1. [DOI] [Google Scholar]
  • 18.Tang D., Man J., Tang L., Feng Y., Yang Q. WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection. Ad Hoc Netw. 2020;102:102145. doi: 10.1016/j.adhoc.2020.102145. [DOI] [Google Scholar]
  • 19.Yue M., Liu L., Wu Z., Wang M. Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network. Int. J. Commun. Syst. 2018;31:e3449. doi: 10.1002/dac.3449. [DOI] [Google Scholar]
  • 20.Wu H., Chen T., Shao Z., Cheng G., Hu X. Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing; Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM); Madrid, Spain. 7–11 December 2021; pp. 1–6. [Google Scholar]
  • 21.Kuzmanovic A., Knightly E.W. Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants; Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications; Karlsruhe, Germany. 25–29 August 2003; pp. 75–86. [Google Scholar]
  • 22.Yan Y., Tang D., Zhan S., Dai R., Chen J., Zhu N. Low-Rate DoS Attack Detection Based on Improved Logistic Regression; Proceedings of the 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS); Zhangjiajie, China. 10–12 August 2019; pp. 468–476. [Google Scholar]
  • 23.Liu L., Wang H., Wu Z., Yue M. The detection method of low-rate DoS attack based on multi-feature fusion. Digit. Commun. Netw. 2020;6:504–513. doi: 10.1016/j.dcan.2020.04.002. [DOI] [Google Scholar]
  • 24.Zhang D., Tang D., Tang L., Dai R., Chen J., Zhu N. PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack; Proceedings of the 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS); Zhangjiajie, China. 10–12 August 2019; pp. 1163–1170. [Google Scholar]
  • 25.Liu L., Yin Y., Wu Z., Pan Q., Yue M. LDoS attack detection method based on traffic classification prediction. IET Inf. Secur. 2022;16:86–96. doi: 10.1049/ise2.12046. [DOI] [Google Scholar]
  • 26.Fouladi R.F., Ermiş O., Anarim E. A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-defined network. Comput. Secur. 2022;112:102524. doi: 10.1016/j.cose.2021.102524. [DOI] [Google Scholar]
  • 27.Gasca M.V., Bueno-Lopez M., Molinas M., Fosso O.B. Time-Frequency analysis for nonlinear and non-stationary signals using HHT: A mode mixing separation technique. IEEE Lat. Am. Trans. 2018;16:1091–1098. doi: 10.1109/TLA.2018.8362142. [DOI] [Google Scholar]
  • 28.Junsheng C., Dejie Y., Yu Y. Research on the intrinsic mode function (IMF) criterion in EMD method. Mech. Syst. Signal Process. 2006;20:817–824. doi: 10.1016/j.ymssp.2005.09.011. [DOI] [Google Scholar]
  • 29.Wu Z.J., Zhang J.A., Yue M., Zhang C.F. Approach of detecting low-rate DoS attack based on combined features. J. Commun. 2017;38:19–30. [Google Scholar]
  • 30.Tang D., Tang L., Dai R., Chen J., Li X., Rodrigues J.J. MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Gener. Comput. Syst. 2020;106:347–359. doi: 10.1016/j.future.2019.12.034. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article. As our data was generated by simulations, they lack the need to be shared.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES