Using learning time as metrics: an artificial intelligence driven risk assess framework to evaluate DDoS cyber attack
The cloud computing and Internet of Things (IoT) have become two key technologies to meet future business requirements. However, a massive scale of Distributed Denial-of-Service (DDoS) has been widely applied to congest network critical links and to paralyze the cloud and IoT service. This is mainly...
Gespeichert in:
Veröffentlicht in: | Journal of intelligent & fuzzy systems 2021-01, Vol.40 (4), p.7691-7699 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 7699 |
---|---|
container_issue | 4 |
container_start_page | 7691 |
container_title | Journal of intelligent & fuzzy systems |
container_volume | 40 |
creator | Chen, Yen-Hung Chang, Arthur Huang, ChunWei |
description | The cloud computing and Internet of Things (IoT) have become two key technologies to meet future business requirements. However, a massive scale of Distributed Denial-of-Service (DDoS) has been widely applied to congest network critical links and to paralyze the cloud and IoT service. This is mainly due to DDoS is easily implemented, obfuscated, and occulted by launching large-scale legitimate low-speed flows and rolling target links to paralyze target network areas. Many metrics and risk access management frameworks to evaluate the impact of DDoS are proposed. However, they all lack time granularity to evaluate the cost of different scales of attacks in IoT or large-scale network structure. This study proposes an AI Driven Evaluation framework, called ADE, that applies Convolution Neural Networks to statistically evaluate the network status through end-to-end functionality (Input: network status; Output: DDoS detected or not) without any manual intervention. ADE provides quantitative security risk analysis by using learning time as the control variable, network structure as the independent variable, and time to identify DDoS as the dependent variable. The learning time to detect DDoS event and recover the system is then applied to evaluate the scale of this DDoS, the reasonability of the regulated RTO, and the vulnerability of the current net-work topology and the improvement due to the new security solution. The experiment results demonstrate the contributions of ADE are (1) providing objective and quantitative analytical security risk assessment indicator, (2) providing an autonomic DDoS defense framework without any manual intervention which allows cloud computing and Internet of Things company focuses on their service and leaves security defending to ADE, and (3) demonstrating the possibility of AI assisted risk assessment which enables security defense solution buyer with less security domain experts to evaluate suitable network defense strategy. |
doi_str_mv | 10.3233/JIFS-189589 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2511973739</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2511973739</sourcerecordid><originalsourceid>FETCH-LOGICAL-c261t-2ba244acaf2b3f0c95993a3bde51eaa10ba6959344c6b055f95c44b1be89f47e3</originalsourceid><addsrcrecordid>eNotkMtKAzEUhoMoWKsrXyDgUkaTSTIzcSet1UrBRe16OEnPlLRzqUmm0rd3Sl2dn8N_gY-Qe86eRCrE8-d8tkx4oVWhL8iIF7lKCp3ll4NmmUx4KrNrchPCljGeq5SNSL8Krt3QGsG3JxFdgxQCbTB6Z8MLhZaCj65y1kFNXRuxrt0GW4t07d0BW-pd2A2RgCHQykODv53f0dhRPEDdQ0Q6nXZLao8GPYUYwe5uyVUFdcC7_zsmq9nb9-QjWXy9zyevi8SmGY9JaiCVEixUqREVs1ppLUCYNSqOAJwZyIafkNJmhilVaWWlNNxgoSuZoxiTh3Pv3nc_PYZYbrvet8NkmSrOdS5yoQfX49llfReCx6rce9eAP5aclSeu5YlreeYq_gAFg2ye</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2511973739</pqid></control><display><type>article</type><title>Using learning time as metrics: an artificial intelligence driven risk assess framework to evaluate DDoS cyber attack</title><source>EBSCOhost Business Source Complete</source><creator>Chen, Yen-Hung ; Chang, Arthur ; Huang, ChunWei</creator><contributor>Hsieh, Wen-Hsiang</contributor><creatorcontrib>Chen, Yen-Hung ; Chang, Arthur ; Huang, ChunWei ; Hsieh, Wen-Hsiang</creatorcontrib><description>The cloud computing and Internet of Things (IoT) have become two key technologies to meet future business requirements. However, a massive scale of Distributed Denial-of-Service (DDoS) has been widely applied to congest network critical links and to paralyze the cloud and IoT service. This is mainly due to DDoS is easily implemented, obfuscated, and occulted by launching large-scale legitimate low-speed flows and rolling target links to paralyze target network areas. Many metrics and risk access management frameworks to evaluate the impact of DDoS are proposed. However, they all lack time granularity to evaluate the cost of different scales of attacks in IoT or large-scale network structure. This study proposes an AI Driven Evaluation framework, called ADE, that applies Convolution Neural Networks to statistically evaluate the network status through end-to-end functionality (Input: network status; Output: DDoS detected or not) without any manual intervention. ADE provides quantitative security risk analysis by using learning time as the control variable, network structure as the independent variable, and time to identify DDoS as the dependent variable. The learning time to detect DDoS event and recover the system is then applied to evaluate the scale of this DDoS, the reasonability of the regulated RTO, and the vulnerability of the current net-work topology and the improvement due to the new security solution. The experiment results demonstrate the contributions of ADE are (1) providing objective and quantitative analytical security risk assessment indicator, (2) providing an autonomic DDoS defense framework without any manual intervention which allows cloud computing and Internet of Things company focuses on their service and leaves security defending to ADE, and (3) demonstrating the possibility of AI assisted risk assessment which enables security defense solution buyer with less security domain experts to evaluate suitable network defense strategy.</description><identifier>ISSN: 1064-1246</identifier><identifier>EISSN: 1875-8967</identifier><identifier>DOI: 10.3233/JIFS-189589</identifier><language>eng</language><publisher>Amsterdam: IOS Press BV</publisher><subject>Access control ; Artificial intelligence ; Artificial neural networks ; Cloud computing ; Convolution ; Cybersecurity ; Denial of service attacks ; Dependent variables ; Evaluation ; Independent variables ; Internet of Things ; Learning ; Low speed ; Risk analysis ; Risk assessment ; Security management ; Topology</subject><ispartof>Journal of intelligent & fuzzy systems, 2021-01, Vol.40 (4), p.7691-7699</ispartof><rights>Copyright IOS Press BV 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c261t-2ba244acaf2b3f0c95993a3bde51eaa10ba6959344c6b055f95c44b1be89f47e3</citedby><cites>FETCH-LOGICAL-c261t-2ba244acaf2b3f0c95993a3bde51eaa10ba6959344c6b055f95c44b1be89f47e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Hsieh, Wen-Hsiang</contributor><creatorcontrib>Chen, Yen-Hung</creatorcontrib><creatorcontrib>Chang, Arthur</creatorcontrib><creatorcontrib>Huang, ChunWei</creatorcontrib><title>Using learning time as metrics: an artificial intelligence driven risk assess framework to evaluate DDoS cyber attack</title><title>Journal of intelligent & fuzzy systems</title><description>The cloud computing and Internet of Things (IoT) have become two key technologies to meet future business requirements. However, a massive scale of Distributed Denial-of-Service (DDoS) has been widely applied to congest network critical links and to paralyze the cloud and IoT service. This is mainly due to DDoS is easily implemented, obfuscated, and occulted by launching large-scale legitimate low-speed flows and rolling target links to paralyze target network areas. Many metrics and risk access management frameworks to evaluate the impact of DDoS are proposed. However, they all lack time granularity to evaluate the cost of different scales of attacks in IoT or large-scale network structure. This study proposes an AI Driven Evaluation framework, called ADE, that applies Convolution Neural Networks to statistically evaluate the network status through end-to-end functionality (Input: network status; Output: DDoS detected or not) without any manual intervention. ADE provides quantitative security risk analysis by using learning time as the control variable, network structure as the independent variable, and time to identify DDoS as the dependent variable. The learning time to detect DDoS event and recover the system is then applied to evaluate the scale of this DDoS, the reasonability of the regulated RTO, and the vulnerability of the current net-work topology and the improvement due to the new security solution. The experiment results demonstrate the contributions of ADE are (1) providing objective and quantitative analytical security risk assessment indicator, (2) providing an autonomic DDoS defense framework without any manual intervention which allows cloud computing and Internet of Things company focuses on their service and leaves security defending to ADE, and (3) demonstrating the possibility of AI assisted risk assessment which enables security defense solution buyer with less security domain experts to evaluate suitable network defense strategy.</description><subject>Access control</subject><subject>Artificial intelligence</subject><subject>Artificial neural networks</subject><subject>Cloud computing</subject><subject>Convolution</subject><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>Dependent variables</subject><subject>Evaluation</subject><subject>Independent variables</subject><subject>Internet of Things</subject><subject>Learning</subject><subject>Low speed</subject><subject>Risk analysis</subject><subject>Risk assessment</subject><subject>Security management</subject><subject>Topology</subject><issn>1064-1246</issn><issn>1875-8967</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNotkMtKAzEUhoMoWKsrXyDgUkaTSTIzcSet1UrBRe16OEnPlLRzqUmm0rd3Sl2dn8N_gY-Qe86eRCrE8-d8tkx4oVWhL8iIF7lKCp3ll4NmmUx4KrNrchPCljGeq5SNSL8Krt3QGsG3JxFdgxQCbTB6Z8MLhZaCj65y1kFNXRuxrt0GW4t07d0BW-pd2A2RgCHQykODv53f0dhRPEDdQ0Q6nXZLao8GPYUYwe5uyVUFdcC7_zsmq9nb9-QjWXy9zyevi8SmGY9JaiCVEixUqREVs1ppLUCYNSqOAJwZyIafkNJmhilVaWWlNNxgoSuZoxiTh3Pv3nc_PYZYbrvet8NkmSrOdS5yoQfX49llfReCx6rce9eAP5aclSeu5YlreeYq_gAFg2ye</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Chen, Yen-Hung</creator><creator>Chang, Arthur</creator><creator>Huang, ChunWei</creator><general>IOS Press BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20210101</creationdate><title>Using learning time as metrics: an artificial intelligence driven risk assess framework to evaluate DDoS cyber attack</title><author>Chen, Yen-Hung ; Chang, Arthur ; Huang, ChunWei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c261t-2ba244acaf2b3f0c95993a3bde51eaa10ba6959344c6b055f95c44b1be89f47e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Artificial intelligence</topic><topic>Artificial neural networks</topic><topic>Cloud computing</topic><topic>Convolution</topic><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>Dependent variables</topic><topic>Evaluation</topic><topic>Independent variables</topic><topic>Internet of Things</topic><topic>Learning</topic><topic>Low speed</topic><topic>Risk analysis</topic><topic>Risk assessment</topic><topic>Security management</topic><topic>Topology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chen, Yen-Hung</creatorcontrib><creatorcontrib>Chang, Arthur</creatorcontrib><creatorcontrib>Huang, ChunWei</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Journal of intelligent & fuzzy systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chen, Yen-Hung</au><au>Chang, Arthur</au><au>Huang, ChunWei</au><au>Hsieh, Wen-Hsiang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Using learning time as metrics: an artificial intelligence driven risk assess framework to evaluate DDoS cyber attack</atitle><jtitle>Journal of intelligent & fuzzy systems</jtitle><date>2021-01-01</date><risdate>2021</risdate><volume>40</volume><issue>4</issue><spage>7691</spage><epage>7699</epage><pages>7691-7699</pages><issn>1064-1246</issn><eissn>1875-8967</eissn><abstract>The cloud computing and Internet of Things (IoT) have become two key technologies to meet future business requirements. However, a massive scale of Distributed Denial-of-Service (DDoS) has been widely applied to congest network critical links and to paralyze the cloud and IoT service. This is mainly due to DDoS is easily implemented, obfuscated, and occulted by launching large-scale legitimate low-speed flows and rolling target links to paralyze target network areas. Many metrics and risk access management frameworks to evaluate the impact of DDoS are proposed. However, they all lack time granularity to evaluate the cost of different scales of attacks in IoT or large-scale network structure. This study proposes an AI Driven Evaluation framework, called ADE, that applies Convolution Neural Networks to statistically evaluate the network status through end-to-end functionality (Input: network status; Output: DDoS detected or not) without any manual intervention. ADE provides quantitative security risk analysis by using learning time as the control variable, network structure as the independent variable, and time to identify DDoS as the dependent variable. The learning time to detect DDoS event and recover the system is then applied to evaluate the scale of this DDoS, the reasonability of the regulated RTO, and the vulnerability of the current net-work topology and the improvement due to the new security solution. The experiment results demonstrate the contributions of ADE are (1) providing objective and quantitative analytical security risk assessment indicator, (2) providing an autonomic DDoS defense framework without any manual intervention which allows cloud computing and Internet of Things company focuses on their service and leaves security defending to ADE, and (3) demonstrating the possibility of AI assisted risk assessment which enables security defense solution buyer with less security domain experts to evaluate suitable network defense strategy.</abstract><cop>Amsterdam</cop><pub>IOS Press BV</pub><doi>10.3233/JIFS-189589</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1064-1246 |
ispartof | Journal of intelligent & fuzzy systems, 2021-01, Vol.40 (4), p.7691-7699 |
issn | 1064-1246 1875-8967 |
language | eng |
recordid | cdi_proquest_journals_2511973739 |
source | EBSCOhost Business Source Complete |
subjects | Access control Artificial intelligence Artificial neural networks Cloud computing Convolution Cybersecurity Denial of service attacks Dependent variables Evaluation Independent variables Internet of Things Learning Low speed Risk analysis Risk assessment Security management Topology |
title | Using learning time as metrics: an artificial intelligence driven risk assess framework to evaluate DDoS cyber attack |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T11%3A50%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Using%20learning%20time%20as%20metrics:%20an%20artificial%20intelligence%20driven%20risk%20assess%20framework%20to%20evaluate%20DDoS%20cyber%20attack&rft.jtitle=Journal%20of%20intelligent%20&%20fuzzy%20systems&rft.au=Chen,%20Yen-Hung&rft.date=2021-01-01&rft.volume=40&rft.issue=4&rft.spage=7691&rft.epage=7699&rft.pages=7691-7699&rft.issn=1064-1246&rft.eissn=1875-8967&rft_id=info:doi/10.3233/JIFS-189589&rft_dat=%3Cproquest_cross%3E2511973739%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2511973739&rft_id=info:pmid/&rfr_iscdi=true |