A BiLSTM-Based DDoS Attack Detection Method for Edge Computing
Yiying Zhang,
Yiyang Liu (),
Xiaoyan Guo,
Zhu Liu,
Xiankun Zhang and
Kun Liang
Additional contact information
Yiying Zhang: College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China
Yiyang Liu: College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China
Xiaoyan Guo: Information and Communication Company, State Grid Tianjin Electric Power Company, Tianjin 300140, China
Zhu Liu: State Grid Information and Communication Industry Group Co., Ltd., Beijing 100070, China
Xiankun Zhang: College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China
Kun Liang: College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China
Energies, 2022, vol. 15, issue 21, 1-17
Abstract:
With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at risk. The traffic generated by Distributed Denial of Service (DDoS) attacks is characterised by short bursts of time, making it difficult to apply existing centralised detection methods that rely on manual setting of attack characteristics to changing attack scenarios. In this paper, a DDoS attack detection model based on Bidirectional Long Short-Term Memory (BiLSTM) is proposed by constructing an edge detection framework, which achieves bi-directional contextual information extraction of the network environment using the BiLSTM network and automatically learns the temporal characteristics of the attack traffic in the original data traffic. This paper takes the DDoS attack in the power Internet of Things as the research object. Simulation results show that the model outperforms traditional advanced models such as Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) in terms of accuracy, false detection rate, and time delay. It plays an auxiliary role in the security protection of the power Internet of Things and effectively improves the reliability of the power grid.
Keywords: distributed denial of service attacks; attack detection; edge computing; bidirectional long short-term memory; power Internet of Things (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1996-1073/15/21/7882/pdf (application/pdf)
https://www.mdpi.com/1996-1073/15/21/7882/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:15:y:2022:i:21:p:7882-:d:951705
Access Statistics for this article
Energies is currently edited by Ms. Agatha Cao
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().