-
IoT DoS and DDoS Attack Detection using ResNet
Authors:
Faisal Hussain,
Syed Ghazanfar Abbas,
Muhammad Husnain,
Ubaid Ullah Fayyaz,
Farrukh Shahzad,
Ghalib A. Shah
Abstract:
The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS…
▽ More
The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules. However, these solutions can become reliable and effective when integrated with artificial intelligence (AI) based techniques. During the last few years, deep learning models especially convolutional neural networks achieved high significance due to their outstanding performance in the image processing field. The potential of these convolutional neural network (CNN) models can be used to efficiently detect the complex DoS and DDoS by converting the network traffic dataset into images. Therefore, in this work, we proposed a methodology to convert the network traffic data into image form and trained a state-of-the-art CNN model, i.e., ResNet over the converted data. The proposed methodology accomplished 99.99\% accuracy for detecting the DoS and DDoS in case of binary classification. Furthermore, the proposed methodology achieved 87\% average precision for recognizing eleven types of DoS and DDoS attack patterns which is 9\% higher as compared to the state-of-the-art.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
IoT-Flock: An Open-source Framework for IoT Traffic Generation
Authors:
Syed Ghazanfar,
Faisal Hussain,
Atiq Ur Rehman,
Ubaid U. Fayyaz,
Farrukh Shahzad,
Ghalib A. Shah
Abstract:
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be u…
▽ More
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used for designing and testing the performance of IoT-specific security solutions. In order to design an IoT-based traffic generation framework, two main challenges include IoT device modelling and generating the IoT normal and attack traffic simultaneously. Therefore, in this work, we propose an open-source framework for IoT traffic generation which supports the two widely used IoT application layer protocols, i.e., MQTT and CoAP. The proposed framework allows a user to create an IoT use case, add customized IoT devices into it and generate normal and malicious IoT traffic over a real-time network. Furthermore, we set up a real-time IoT smart home use case to manifest the applicability of the proposed framework for developing the security solutions for IoT smart home by emulating the real world IoT devices. The experimental results demonstrate that the proposed framework can be effectively used to develop better security solutions for IoT networks without physically deploying the real-time use case.
△ Less
Submitted 2 April, 2020;
originally announced April 2020.
-
CRAFT: A library for easier application-level Checkpoint/Restart and Automatic Fault Tolerance
Authors:
Faisal Shahzad,
Jonas Thies,
Moritz Kreutzer,
Thomas Zeiser,
Georg Hager,
Gerhard Wellein
Abstract:
In order to efficiently use the future generations of supercomputers, fault tolerance and power consumption are two of the prime challenges anticipated by the High Performance Computing (HPC) community. Checkpoint/Restart (CR) has been and still is the most widely used technique to deal with hard failures. Application-level CR is the most effective CR technique in terms of overhead efficiency but…
▽ More
In order to efficiently use the future generations of supercomputers, fault tolerance and power consumption are two of the prime challenges anticipated by the High Performance Computing (HPC) community. Checkpoint/Restart (CR) has been and still is the most widely used technique to deal with hard failures. Application-level CR is the most effective CR technique in terms of overhead efficiency but it takes a lot of implementation effort. This work presents the implementation of our C++ based library CRAFT (Checkpoint-Restart and Automatic Fault Tolerance), which serves two purposes. First, it provides an extendable library that significantly eases the implementation of application-level checkpointing. The most basic and frequently used checkpoint data types are already part of CRAFT and can be directly used out of the box. The library can be easily extended to add more data types. As means of overhead reduction, the library offers a build-in asynchronous checkpointing mechanism and also supports the Scalable Checkpoint/Restart (SCR) library for node level checkpointing. Second, CRAFT provides an easier interface for User-Level Failure Mitigation (ULFM) based dynamic process recovery, which significantly reduces the complexity and effort of failure detection and communication recovery mechanism. By utilizing both functionalities together, applications can write application-level checkpoints and recover dynamically from process failures with very limited programming effort. This work presents the design and use of our library in detail. The associated overheads are thoroughly analyzed using several benchmarks.
△ Less
Submitted 7 August, 2017;
originally announced August 2017.
-
Survey on Essential and Accidental Real-Time Issues in Software Engineering
Authors:
Furrakh Shahzad,
Maruf Pasha,
Urooj Pasha,
Bushra Majeed,
Khurram Shahzad
Abstract:
Software product lines have recently been presented as one of the best promising improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the problems of producing a perfect software scheme. Traditional approaches or recycling software are not effective to solve the problems concerning software competence. Since fast…
▽ More
Software product lines have recently been presented as one of the best promising improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the problems of producing a perfect software scheme. Traditional approaches or recycling software are not effective to solve the problems concerning software competence. Since fast developments with software engineering in the past few years, studies show that some approaches are getting extensive attention in both industries and universities. This method is categorized as the software product line improvement; that supports reusing of software in big organizations. Different industries are adopting product lines to enhance efficiency and reduce operational expenses by way of emerging product developments. This research paper is formed to offer in-depth study regarding the software engineering issues such as complexity, conformity, changeability, invisibility, time constraints, budget constraints, and security. We have conducted various research surveys by visiting different professional software development organizations and took feedback from the professional software engineers to analyze the real-time problems that they are facing during the development process of software systems. Survey results proved that complexity is a most occurring issue that most software developers face while developing software applications. Moreover, invisibility is the problem that rarely happens according to the survey.
△ Less
Submitted 10 March, 2017;
originally announced March 2017.
-
An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS)
Authors:
M. Omer Mushtaq,
Furrakh Shahzad,
M. Owais Tariq,
Mahina Riaz,
Bushra Majeed
Abstract:
There is a dynamic escalation and extension in the new infrastructure, educating personnel and licensing new computer programs in the field of IT, due to the emergence of Cloud Computing (CC) paradigm. It has become a quick growing segment of IT business in last couple of years. However, due to the rapid growth of data, people and IT firms, the issue of information security is getting more complex…
▽ More
There is a dynamic escalation and extension in the new infrastructure, educating personnel and licensing new computer programs in the field of IT, due to the emergence of Cloud Computing (CC) paradigm. It has become a quick growing segment of IT business in last couple of years. However, due to the rapid growth of data, people and IT firms, the issue of information security is getting more complex. One of the major concerns of the user is, at what degree the data is safe on Cloud? In spite of all promotional material encompassing the cloud, consortium customers are not willing to shift their business on the cloud. Data security is the major problem which has limited the scope of cloud computing. In new cloud computing infrastructure, the techniques such as the Strong Secure Shell and Encryption are deployed to guarantee the authenticity of the user through logs systems. The vendors utilize these logs to analyze and view their data. Therefore, this implementation is not enough to ensure security, privacy and authoritative use of the data. This paper introduces quad layered framework for data security, data privacy, data breaches and process associated aspects. Using this layered architecture we have preserved the secrecy of confidential information and tried to build the trust of user on cloud computing. This layered framework prevents the confidential information by multiple means i.e. Secure Transmission of Data, Encrypted Data and its Processing, Database Secure Shell and Internal/external log Auditing.
△ Less
Submitted 23 February, 2017;
originally announced February 2017.
-
A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures
Authors:
Furrakh Shahzad,
Maruf Pasha,
Arslan Ahmad
Abstract:
Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an aband…
▽ More
Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an abandoned environment makes network systems helpless against an assortment of strong assaults, intrinsic memory and power restrictions of sensor nodes make the traditional security arrangements impractical. The sensing knowledge combined with the wireless communication and processing power makes it lucrative for being abused. The wireless sensor network technology also obtains a big variety of security intimidations. This paper describes four basic security threats and many active attacks on WSN with their possible countermeasures proposed by different research scholars.
△ Less
Submitted 23 February, 2017;
originally announced February 2017.
-
Analysis of challenges faced by WebRTC videoconferencing and a remedial architecture
Authors:
Maruf Pasha,
Furrakh Shahzad,
Arslan Ahmad
Abstract:
Lately, World Wide Web came up with an evolution in the niche of videoconference applications. Latest technologies give browsers a capacity to initiate real-time communications. WebRTC is one of the free and open source projects that aim at providing the users freedom to enjoy real-time communications, and it does so by following and redefining the standards. However, WebRTC is still a new project…
▽ More
Lately, World Wide Web came up with an evolution in the niche of videoconference applications. Latest technologies give browsers a capacity to initiate real-time communications. WebRTC is one of the free and open source projects that aim at providing the users freedom to enjoy real-time communications, and it does so by following and redefining the standards. However, WebRTC is still a new project and it lacks some high-end videoconferencing features such as media mixing, recording of a session and different network conditions adaptation. This paper is an attempt at analyzing the shortcomings and challenges faced by WebRTC and proposing a Multipoint Control Unit or traditional communications entity based architecture as a solution.
△ Less
Submitted 13 February, 2017; v1 submitted 1 January, 2017;
originally announced January 2017.
-
GHOST: Building blocks for high performance sparse linear algebra on heterogeneous systems
Authors:
Moritz Kreutzer,
Jonas Thies,
Melven Röhrig-Zöllner,
Andreas Pieper,
Faisal Shahzad,
Martin Galgon,
Achim Basermann,
Holger Fehske,
Georg Hager,
Gerhard Wellein
Abstract:
While many of the architectural details of future exascale-class high performance computer systems are still a matter of intense research, there appears to be a general consensus that they will be strongly heterogeneous, featuring "standard" as well as "accelerated" resources. Today, such resources are available as multicore processors, graphics processing units (GPUs), and other accelerators such…
▽ More
While many of the architectural details of future exascale-class high performance computer systems are still a matter of intense research, there appears to be a general consensus that they will be strongly heterogeneous, featuring "standard" as well as "accelerated" resources. Today, such resources are available as multicore processors, graphics processing units (GPUs), and other accelerators such as the Intel Xeon Phi. Any software infrastructure that claims usefulness for such environments must be able to meet their inherent challenges: massive multi-level parallelism, topology, asynchronicity, and abstraction. The "General, Hybrid, and Optimized Sparse Toolkit" (GHOST) is a collection of building blocks that targets algorithms dealing with sparse matrix representations on current and future large-scale systems. It implements the "MPI+X" paradigm, has a pure C interface, and provides hybrid-parallel numerical kernels, intelligent resource management, and truly heterogeneous parallelism for multicore CPUs, Nvidia GPUs, and the Intel Xeon Phi. We describe the details of its design with respect to the challenges posed by modern heterogeneous supercomputers and recent algorithmic developments. Implementation details which are indispensable for achieving high efficiency are pointed out and their necessity is justified by performance measurements or predictions based on performance models. The library code and several applications are available as open source. We also provide instructions on how to make use of GHOST in existing software packages, together with a case study which demonstrates the applicability and performance of GHOST as a component within a larger software stack.
△ Less
Submitted 15 February, 2016; v1 submitted 29 July, 2015;
originally announced July 2015.
-
Building a fault tolerant application using the GASPI communication layer
Authors:
Faisal Shahzad,
Moritz Kreutzer,
Thomas Zeiser,
Rui Machado,
Andreas Pieper,
Georg Hager,
Gerhard Wellein
Abstract:
It is commonly agreed that highly parallel software on Exascale computers will suffer from many more runtime failures due to the decreasing trend in the mean time to failures (MTTF). Therefore, it is not surprising that a lot of research is going on in the area of fault tolerance and fault mitigation. Applications should survive a failure and/or be able to recover with minimal cost. MPI is not yet…
▽ More
It is commonly agreed that highly parallel software on Exascale computers will suffer from many more runtime failures due to the decreasing trend in the mean time to failures (MTTF). Therefore, it is not surprising that a lot of research is going on in the area of fault tolerance and fault mitigation. Applications should survive a failure and/or be able to recover with minimal cost. MPI is not yet very mature in handling failures, the User-Level Failure Mitigation (ULFM) proposal being currently the most promising approach is still in its prototype phase. In our work we use GASPI, which is a relatively new communication library based on the PGAS model. It provides the missing features to allow the design of fault-tolerant applications. Instead of introducing algorithm-based fault tolerance in its true sense, we demonstrate how we can build on (existing) clever checkpointing and extend applications to allow integrate a low cost fault detection mechanism and, if necessary, recover the application on the fly. The aspects of process management, the restoration of groups and the recovery mechanism is presented in detail. We use a sparse matrix vector multiplication based application to perform the analysis of the overhead introduced by such modifications. Our fault detection mechanism causes no overhead in failure-free cases, whereas in case of failure(s), the failure detection and recovery cost is of reasonably acceptable order and shows good scalability.
△ Less
Submitted 18 May, 2015;
originally announced May 2015.