Research Article |
A Smart Secure model for Detection of DDoS Malicious Traces in Integrated LEO Satellite-Terrestrial Communications
Author(s): Lakshmisree Panigrahi, Binod Kumar Pattanayak*, Bibhuprasad Mohanty, Saumendra Pattnaik and Ahmad Khader Habboush
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 12, Issue 2
Publisher : FOREX Publication
Published : 30 May 2024
e-ISSN : 2347-470X
Page(s) : 503-511
Abstract
For many researchers, defense against DDoS attacks has always been a major subject of attention. Within the LEO Satellite-Terrestrial (LSTN) network field, distributed denial of service (DDoS) attacks is considered to be one of the most potentially harmful attack techniques. For the facilitation of network protection by the detection of DDoS malicious traces inside a network of satellite devices, machine learning algorithms plays a significant role. This paper uses modern machine learning approaches on a novel benchmark Satellite dataset. The STIN and NSL-KDD datasets has been used to detect network anomalies. The pre-processing of data has been performed effectively and a host of ML methods have been applied to classify the outputs into normal, regular node or untrustable /malicious node. We have evaluated the analysis results in presence of attacks as well as without presence of attacks, supervised machine learning techniques basic measurements like accuracy, True positive, False positive etc. Our proposed trust model shows better accuracy, nearby 98% and we have shown that our proposed machine learning based security model performs better to get rid of DDoS attacks on integrated LEO satellite-terrestrial networks without compromising on the packet routing efficiency. We are able to improve routing speed and improve network security against distributed denial of service (DDoS) attacks by integrating an ensemble-based trust model trained on NSL-KDD+STIN+Exata Simulated resultant dataset with ACO for routing decisions. In dynamic network scenarios, as trustworthiness is an essential criterion in route decision-making, this proposed approach signifies resilient and adaptable routing.
Keywords: Satellite Communication
, Security
, anomaly detection
, LEO
, QoS
, GEO
, machine learning
, supervised learning
, trust models
.
Lakshmisree Panigrahi, Department of Computer Science and Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: laxmishreepanigrahi@soa.ac.in
Binod Kumar Pattanayak*, Department of Computer Science and Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: binodpattanayak@soa.ac.in
Bibhuprasad Mohanty, Department of Electronics and Communication Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: bibhumohanty@soa.ac.in
Saumendra Pattnaik, Department of Computer Science and Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: saumendrapattnaik@soa.ac.in
Ahmad Khader Habboush, faculty of Information Technology, Jerash University, Jerash, Jordan; Email: ahmad_ram2001@jpu.edu.jo
-
[1] Lin, Z., Lin, M., Champagne, B., Zhu, W. P., & Al-Dhahir, N. (2020). Secure beamforming for cognitive satellite terrestrial networks with unknown eavesdroppers. IEEE Systems Journal, 15(2), 2186-2189. [CrossRef]
-
[2] Lin, Z., Lin, M., Champagne, B., Zhu, W. P., & Al-Dhahir, N. (2020). Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks. IEEE Wireless Communications Letters, 10(2), 251-255. [CrossRef]
-
[3] Boley, A. C., & Byers, M. (2021). Satellite mega-constellations create risks in Low Earth Orbit, the atmosphere and on Earth. Scientific Reports, 11(1), 10642. [CrossRef]
-
[4] Del Portillo, I., Cameron, B. G., & Crawley, E. F. (2019). A technical comparison of three low earth orbit satellite constellation systems to provide global broadband. Acta astronautica, 159, 123-135. [CrossRef]
-
[5] Rossi, A., Petit, A., & McKnight, D. (2020). Short-term space safety analysis of LEO constellations and clusters. Acta Astronautica, 175, 476-483. [CrossRef]
-
[6] Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Alazab, M., ... & Gadekallu, T. R. (2022). Federated learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications.
-
[7] Shah, S. M. J., Nasir, A., & Ahmed, H. (2014). A survey paper on security issues in satellite communication network infrastructure. International Journal of Engineering Research and General Science, 2(6), 887-900.
-
[8] Li, H., Shi, D., Wang, W., Liao, D., Gadekallu, T. R., & Yu, K. (2022). Secure routing for LEO satellite network survivability. Computer Networks, 211, 109011. [CrossRef]
-
[9] Muhaidheen, M., Muralidharan, S., & Vanaja, N. (2022). Multiport Converter for CubeSat. International Journal of Electrical and Electronics Research, 10(2), 290-296.
-
[10] Zhang, Y., Wang, Y., Hu, Y., Lin, Z., Zhai, Y., Wang, L., ... & Kang, L. (2022). Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack. Sensors, 22(19), 7286. [CrossRef]
-
[11] Ashraf, I., Narra, M., Umer, M., Majeed, R., Sadiq, S., Javaid, F., & Rasool, N. (2022). A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics, 11(4), 667.
-
[12] Li, K., Zhou, H., Tu, Z., Wang, W., & Zhang, H. (2020). Distributed network intrusion detection system in satellite-terrestrial integrated networks using federated learning. IEEE Access, 8, 214852-214865. [CrossRef]
-
[13] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). Ieee. [CrossRef]
-
[14] Aburomman, A. A., & Reaz, M. B. I. (2016). A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft Computing, 38, 360-372.
-
[15] Aburomman, A. A., & Reaz, M. B. I. (2016, October). Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection. In 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (pp. 636-640). IEEE. [CrossRef]
-
[16] Ampomah, E. K., Qin, Z., & Nyame, G. (2020). Evaluation of tree-based ensemble machine learning models in predicting stock price direction of movement. Information, 11(6), 332. [CrossRef]
-
[17] Divya, C. D., & Rajendra, A. B. (2020). Review on Prevailing Difficulties Using IriS Recognition. In Computational Vision and Bio-Inspired Computing: ICCVBIC 2019 (pp. 656-661). Springer International Publishing. [CrossRef]
-
[18] Jenila, L., & Canessane, R. A. (2022). Cross Layer Based Dynamic Traffic Scheduling Algorithm for Wireless Multimedia Sensor Network. IJEER, 10(2), 399-404. [CrossRef]
-
[19] Manhar, A., & Dembla, D. Improved Hybrid Routing Protocol (IHRP) in MANETs Based on Situation Based Adaptive Routing. [CrossRef]
-
[20] Behera, B. B., Mohanty, R. K., & Pattanayak, B. K. (2022). Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach. Specialusis Ugdymas, 1(43), 879-905.
-
[21] Ballav, B., Rana, G., & Pattanayak, B. K. (2015, December). Investigating the effect of Black Hole attack on Zone Based Energy Efficient Routing Protocol for Mobile Sensor Networks. In 2015 International Conference on Information Technology (ICIT) (pp. 113-118). IEEE. [CrossRef]
-
[22] Swain, J., Pattanayak, B. K., & Pati, B. (2021). A systematic study and analysis of security issues in mobile ad-hoc networks. In Research anthology on securing mobile technologies and applications (pp. 144-150). IGI Global. [CrossRef]
-
[23] Zhu, H.; Chen, S.Y.; Li, F.H.;Wu, H.; Zhao, H.Q.;Wang, G. User random access authentication protocol for low earth orbit satellite networks. J. Tsinghua Univ. (Sci. Technol.) 2019, 59, 1–8. [CrossRef].
-
[24] K. Li, H. Zhou, Z. Tu, W. Wang and H. Zhang, "Distributed Network Intrusion Detection System in Satellite-Terrestrial Integrated Networks Using Federated Learning," in IEEE Access, vol. 8, pp. 214852-214865, 2020, doi: 10.1109/ACCESS.2020.3041641. [CrossRef]
-
[25] https://www.keysight.com/us/en/assets/3122-1407/data-sheets/EXata-Cyber-Attack-Emulator-Library.pdf