IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v15y2022i21p7882-d951705.html
   My bibliography  Save this article

A BiLSTM-Based DDoS Attack Detection Method for Edge Computing

Author

Listed:
  • Yiying Zhang

    (College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China)

  • Yiyang Liu

    (College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China)

  • Xiaoyan Guo

    (Information and Communication Company, State Grid Tianjin Electric Power Company, Tianjin 300140, China)

  • Zhu Liu

    (State Grid Information and Communication Industry Group Co., Ltd., Beijing 100070, China)

  • Xiankun Zhang

    (College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China)

  • Kun Liang

    (College of Artificial Intelligence, Tianjin University of Science & Technology, Tianjin 300457, China)

Abstract

With the rapid development of smart grids, the number of various types of power IoT terminal devices has grown by leaps and bounds. An attack on either of the difficult-to-protect end devices or any node in a large and complex network can put the grid at risk. The traffic generated by Distributed Denial of Service (DDoS) attacks is characterised by short bursts of time, making it difficult to apply existing centralised detection methods that rely on manual setting of attack characteristics to changing attack scenarios. In this paper, a DDoS attack detection model based on Bidirectional Long Short-Term Memory (BiLSTM) is proposed by constructing an edge detection framework, which achieves bi-directional contextual information extraction of the network environment using the BiLSTM network and automatically learns the temporal characteristics of the attack traffic in the original data traffic. This paper takes the DDoS attack in the power Internet of Things as the research object. Simulation results show that the model outperforms traditional advanced models such as Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) in terms of accuracy, false detection rate, and time delay. It plays an auxiliary role in the security protection of the power Internet of Things and effectively improves the reliability of the power grid.

Suggested Citation

  • Yiying Zhang & Yiyang Liu & Xiaoyan Guo & Zhu Liu & Xiankun Zhang & Kun Liang, 2022. "A BiLSTM-Based DDoS Attack Detection Method for Edge Computing," Energies, MDPI, vol. 15(21), pages 1-17, October.
  • Handle: RePEc:gam:jeners:v:15:y:2022:i:21:p:7882-:d:951705
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/15/21/7882/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/15/21/7882/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:15:y:2022:i:21:p:7882-:d:951705. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.