Next Article in Journal
A Highly Sensitive D-Shaped PCF-SPR Sensor for Refractive Index and Temperature Detection
Previous Article in Journal
Smart Ship Draft Reading by Dual-Flow Deep Learning Architecture and Multispectral Information
Previous Article in Special Issue
SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks

by
Andy Reed
*,
Laurence Dooley
and
Soraya Kouadri Mostefaoui
School of Computing and Communications, The Open University, Walton Hall, Milton Keynes MK7 6AA, UK
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(17), 5581; https://doi.org/10.3390/s24175581
Submission received: 28 June 2024 / Revised: 23 August 2024 / Accepted: 27 August 2024 / Published: 28 August 2024
(This article belongs to the Special Issue Sensors Based SoCs, FPGA in IoT Applications)

Abstract

The pernicious impact of malicious Slow DoS (Denial of Service) attacks on the application layer and web-based Open Systems Interconnection model services like Hypertext Transfer Protocol (HTTP) has given impetus to a range of novel detection strategies, many of which use machine learning (ML) for computationally intensive full packet capture and post-event processing. In contrast, existing detection mechanisms, such as those found in various approaches including ML, artificial intelligence, and neural networks neither facilitate real-time detection nor consider the computational overhead within resource-constrained Internet of Things (IoT) networks. Slow DoS attacks are notoriously difficult to reliably identify, as they masquerade as legitimate application layer traffic, often resembling nodes with slow or intermittent connectivity. This means they often evade detection mechanisms because they appear as genuine node activity, which increases the likelihood of mistakenly being granted access by intrusion-detection systems. The original contribution of this paper is an innovative Guardian Node (GN) Slow DoS detection model, which analyses the two key network attributes of packet length and packet delta time in real time within a live IoT network. By designing the GN to operate within a narrow window of packet length and delta time values, accurate detection of all three main Slow DoS variants is achieved, even under the stealthiest malicious attack conditions. A unique feature of the GN model is its ability to reliably discriminate Slow DoS attack traffic from both genuine and slow nodes experiencing high latency or poor connectivity. A rigorous critical evaluation has consistently validated high, real-time detection accuracies of more than 98% for the GN model across a range of demanding traffic profiles. This performance is analogous to existing ML approaches, whilst being significantly more resource efficient, with computational and storage overheads being over 96% lower than full packet capture techniques, so it represents a very attractive alternative for deployment in resource-scarce IoT environments.
Keywords: slow DoS; internet of things; slow read; slow post; slow HTTP get; guardian node slow DoS; internet of things; slow read; slow post; slow HTTP get; guardian node

Share and Cite

MDPI and ACS Style

Reed, A.; Dooley, L.; Mostefaoui, S.K. The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks. Sensors 2024, 24, 5581. https://doi.org/10.3390/s24175581

AMA Style

Reed A, Dooley L, Mostefaoui SK. The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks. Sensors. 2024; 24(17):5581. https://doi.org/10.3390/s24175581

Chicago/Turabian Style

Reed, Andy, Laurence Dooley, and Soraya Kouadri Mostefaoui. 2024. "The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks" Sensors 24, no. 17: 5581. https://doi.org/10.3390/s24175581

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop