Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme †
Abstract
:1. Introduction
- ▪
- Different botnet attack sources were analysed with the locust search mechanism to solve the multimodal optimisation problem according to the natural behaviour of locust swarms.
- ▪
- ▪
- The LS-PSO algorithm has the advantages of the WOSP algorithm and gradient descent method. The LS-PSO algorithm constructed the attack paths first using the cluster strategy, then the route (CFRS) strategy for path searching in the entire solution space, and then found the global multi-objective solution.
- ▪
- The accuracy of the LS-PSO algorithm was 99.07% and 95.05% for the effects of dynamic traffic in two experimental networks (number of nodes = 32 and 64, resectively).
- ▪
- Compared with other route-searching algorithms, such as the A* algorithm [16] and PSO algorithm [4,5,6,7], the proposed LS-PSO algorithm exhibited a higher traceback accuracy in the reconstruction of attack paths, which were employed for analysing attack origins from multiple data sources by using ns-3 with the Boston University Representative Internet Topology Generator (BRITE) framework.
2. Overview of Multiswarm PSO Schemes
LSO Algorithm
Algorithm 1 Locust Swarm Optimisation (LSO) Algorithm |
1. For Swarm 1 |
2. Generate R random particles |
3. Select a subset S with the best particles for a particle swarm |
4. Assign a random velocity to each particle |
5. Run each particle for n iterations |
6. Optimise the best particles by using the gradient descent search algorithm |
7. For Swarms 2–N |
8. Generate R random points around the previous optimum |
9. Select a subset S with the best points for a specific particle swarm |
10. Run each particle for n iterations |
11. Optimise the best points by using the gradient descent search algorithm |
12. Obtain the best optimum |
3. Application of the LSO Algorithm for Solving the IPTBK Problem
3.1. Basic Idea
3.2. Tracing the Sources of DDoS Attacks by Using the LS-PSO Algorithm
Algorithm 2 Pseudocode of the LS-PSO Algorithm |
Input: parameters of the LS-PSO model, including the initial values of max_gen, c1, c2, x, and v for the particles, and the network topology generated using Waxman theory |
Generate R random points (x, y) in a swarm |
Select a subset S with the best points from the original swarm |
Assign an initial velocity to each point by using Equation (3) |
While (the number of max_gen) do |
For each particle i in the subswarm k, do |
For each particle i, do |
Update the velocity vki and position xki by using Equations (4)–(6) |
Adjust the particle acceleration (weight: wi) by minimising the routing cost Ci by using Equation (7) |
End for |
Calculate the particle fitness value of xki |
End for |
If (generation ≥ R) the neighbouring subswarms are randomly regrouped |
Generate R random points (x, y) around local optimal solutions |
Select a subset S with the best points from the original swarm |
Set the velocity for each point so that each individual point moves away from its original location |
Optimise the best point by using Equations (8) and (9) |
Update the individual best position Pbest and swarm best position Pgbest |
gen = gen + 1 |
End |
Calculate the coverage percentage of each path by using Equation (10) |
Output: optimal solution for possible paths |
4. Discussion
4.1. Case Study I: Network Performance Analysis for DDoS Attacks (32 Nodes)
- Step 1: Data preprocessing
4.1.1. Creation of the Network Topology
- Step 1.2: Data pre-processing for DDoS threats
- Step 1.2.1: Attack on the victim
- Step 1.2.2: Data collection
- Step 2: Route construction
4.1.2. Dynamic Routing Costs of All the Routes
- Route 1: [‘n1′, ‘sw1′, ‘r1′, ‘r6′, ‘r8′, ‘sw4′, ‘n17′]
- Route 2: [‘n1′, ‘sw1′, ‘r1′, ‘r4′, ‘r7′, ‘r8′, ‘sw4′, ‘n17′]
- Route 3: [‘n6′, ‘sw2′, ‘r2′, ‘r6′, ‘r8′, ‘sw4′, ‘n17′]
- Route 4: [‘n11′, ‘sw3′, ‘r5′, ‘r4′, ‘r7′, ‘r8′, ‘sw4′, ‘n17′]
- Route 5: [‘n11′, ‘sw3′, ‘r5′, ‘r4′, ‘r1′, ‘r6′, ‘r8′, ‘sw4′, ‘n17′]
- Step 3: Model validation phase
4.2. Case study II: Network Performance Analysis for DDoS Attacks (64 Nodes)
4.3. Case Study III: Network Performance Analysis for DDoS Attacks with Different Subswarms (64 Nodes)
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Nomenclature
Problem formulation: | |
Symbol list. | |
c1 and c2 | acceleration constants |
route cost of path | |
dij | travel routing distance (hop count) |
E | a set of edges eij |
eij | edge from node xi to node xj |
G | gravity vector |
Lp | cost function |
N | a set of network nodes |
ns | a set of nodes for attack sources |
nd | a set of victim |
of a path from node i to node j for particle n | |
rand() | a random number in the range (0, 1) |
quality of service | |
the velocity of particle i in k subswarm | |
initial speed of a particle | |
the position of particle i in k subswarm | |
the movement of Δt for particle i in k subswarm | |
the movement of Δt for a particle in k subswarm (CFRS strategy) |
References
- Nguyen, A. Taiwan’s Central Bank to Offer Banknote Exchange ahead of Lunar New Year. Taiwan News, 30 January 2018. [Google Scholar]
- FS-ISAC. More than 100 Financial Services Firms Hit with DDoS Extortion Attacks. Taiwan News, 10 February 2021. [Google Scholar]
- Catak, F. Two-layer malicious network flow detection system with sparse linear model based feature selection. J. Natl. Sci. Found. Sri Lanka 2018, 46, 601–612. [Google Scholar] [CrossRef]
- Shi, Y.; Eberhart, R. A Modified Particle Swarm Optimizer. In Proceedings of the IEEE International Conference on Evolutionary Computation, Anchorage, AK, USA, 4–9 May 1998; pp. 69–73. [Google Scholar]
- Angeline, P.J. Evolutionary Optimization versus Particle Swarm Optimization: Philosophy and Performance Difference. In Proceedings of the 7th Annual Conference on Evolutionary Programming, International Conference on Evolutionary Computation, San Diego, CA, USA, 25–27 March 1998; pp. 69–73. [Google Scholar]
- Lin, H.C.; Wang, P.; Lin, W.H. Implementation of an PSO-based security defense mechanism for tracing the sources of DDoS attacks. Computers 2019, 8, 88. [Google Scholar] [CrossRef] [Green Version]
- Eberhart, R.C.; Shi, Y. Comparing Inertia Weights and Constriction Factors in Particle Swarm Optimization. In Proceedings of the Congress on Evolutionary Computation, La Jolla, CA, USA, 16–19 July 2000; pp. 84–88. [Google Scholar]
- Multi-Swarm Optimization. Available online: https://en.wikipedia.org/wiki/Multi-swarm_optimization (accessed on 25 February 2021).
- Hendtlass, T. WoSP: A Multi-Optima Particle Swarm Algorithm. In Proceedings of the IEEE 2005 Congress on Evolutionary Computation, Edinburgh, UK, 2–5 September 2005; pp. 727–734. [Google Scholar]
- Zhang, Q.W.; Zhan, F.F. Particle swarm optimization algorithm based on multi-subgroup harmony search. J. Comput. 2020, 31, 116–126. [Google Scholar]
- Zhao, S.Z.; Liang, J.J.; Suganthan, P.N.; Tasgetiren, M.F. Dynamic Multi-Swarm Particle Swarm Optimizer with Local Search for Large Scale Global Optimization. In Proceedings of the IEEE 2008 Congress on Evolutionary Computation, Hong Kong, China, 1–6 June 2008; pp. 3845–3852. [Google Scholar]
- Xua, X.; Tang, Y.; Li, J.; Hua, C.; Guan, X. Dynamic multi-swarm particle swarm optimizer with cooperative learning strategy. Appl. Soft Comput. 2015, 29, 169–183. [Google Scholar] [CrossRef]
- Chen, S.; Montgomery, J. Selection Strategies for Initial Positions and Initial Velocities in Multi-Optima Particle Swarms. In Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation, Dublin, Ireland, 12–16 July 2011; pp. 53–60. [Google Scholar]
- Chen, S. Locust Swarms-A New Multi-Optima Search Technique. In Proceedings of the 2009 IEEE Congress on Evolutionary Computation, Trondheim, Norway, 18–21 May 2009; pp. 1745–1752. [Google Scholar]
- Cuevas, E.; González, A.; Fausto, F.; Zaldívar, D.; Pérez-Cisneros, M. Multithreshold segmentation by using an algorithm based on the behavior of locust swarms. Math. Probl. Eng. 2015, 2015, 805357. [Google Scholar] [CrossRef] [Green Version]
- A* Search Algorithm. Available online: https://en.wikipedia.org/wiki/A*_search_algorithm/ (accessed on 17 January 2020).
Scheme | Feature | Advantage | Limitation |
---|---|---|---|
WOSP algorithm [9,10] | To avoid premature convergence, the WOSP algorithm uses the short-range force (SRF) to repel particles that are too close to each other. | The WOSP algorithm is especially suitable for the optimisation of multimodal problems with multiple local optima by using the SRF. | Sometimes, the WOSP algorithm may generate loop iterations in the process of searching for the global optimum. |
MS-PSO algorithm [11,12,13] | The DMS-PSO algorithm periodically regroups the particles of subswarms after they have converged into new subswarms, and new swarms are produced with particles from previous swarms. | By using the local search and convergence search processes, the DMS-PSO algorithm can achieve a good balance between exploration and exploitation abilities in multimodal problems. | The DMS-PSO algorithm separates the optimum search process into two distinct phases, which can weaken both mechanisms of the search process. |
LSO algorithm [14,15] | The LSO algorithm uses a fixed time interval and direction according to the scout particles for suggesting the starting point of the multiparticle swarm for scattering to explore possible new paths. | The LSO algorithm selects scout particles to propose smart starting points for multiswarm PSO for scattering. The particle movement is directed away from the previous best solution and previously searched solution space. | The LSO algorithm complicates the search process for the optimal solution. |
Simple Routes Using All_Simple_Paths API | |
---|---|
Route 1 | n1–Switch 1–router 1–router 6–router 8–Switch 4–n17 |
Route 2 | n1–Switch 1–router 1–router 7–router 8–Switch4–n17 |
Route 3 | n6–Switch 2–router 2–router 6–router 1–router 4–router 7–router 8–Switch 4–n17 |
Route 4 | n6–Switch 2–router 2–router 6–router 8–Switch 4–n17 |
Route 5 | n6–Switch 2–router 2–router 3–router 6–router 1–router 4–router 7–router 8–Switch 4–n17 |
Route 6 | n6–Switch 2–router 2–router 3–router 6–router 8–Switch 4–n17 |
Route 7 | n11–Switch 3–router 5–router 4–router 1–router 8–Switch 4–n17 |
Route 8 | n11–Switch 3–router 5–router 4–router 7–router 8–Switch 4–n17 |
Routes between the Attack Nodes and the Victim Using A* Search Algorithm | |
---|---|
Route 1 | n1–Switch 1–router 1–router 6–router 8–Switch 4–n17 |
Route 2 | n6–Switch 6–router 2–router 6–router 8–Switch4–n17 |
Route 3 | n11–Switch 3–router 5–router 4–router 7–router 8–Switch 4–n17 |
Attack Path | Packets Collected | Coverage Percentage | |
---|---|---|---|
Route 1 | n1–Switch 1–router 1–router 6–router 8–Switch 4–n17 | 840 | 31.29% |
Route 2 | n1–Switch 1–router 1–router 4–router 7–router 8–Switch 4–n17 | 840 | 31.29% |
Route 3 | n6–Switch 2–router 2–router 6–router 8–Switch 4–n17 | 810 | 30.17% |
Route 4 | n11–Switch 3–router 5–router 4–router 7–router 8–Switch 4–n17 | 70 | 2.06% |
Route 5 | n11–Switch 3–router 5–router 4–router 1–router 6–router 8–Switch 4–n17 | 100 | 3.12% |
Total | 2660 | 99.07% |
Attack Path | Packets Collected | Coverage Percentage | |
---|---|---|---|
Route 1 | n1-switch1-router1-router6-router9-router8-router10-switch4-n17 | 508 | 11.22% |
Route 2 | n1-switch1-router1- router13-router6- router9-router8-router10-switch4-n17 | 508 | 11.22% |
Route 3 | n11-switch3-router7-router5-router6-router9-router8-router10-switch4-n17 | 420 | 4.46% |
Route 4 | n21-switch5-router17-router4-router2-router1-router6-router9-router8- router10-switch4-n17 | 202 | 9.28% |
Route 5 | n21-switch5-router17-router2-router1-router6-router9-router8-router10- switch4-n17 | 428 | 9.46% |
Route 6 | n31-switch7-router18-router11-router12-router7-router5-router6-router9-router8- router10-switch4-n17 | 426 | 9.41% |
Route 7 | n31-switch7-router18-router11-router12-router7-router14-router5-router6- router9-router8-router10-switch4-n17 | 423 | 9.35% |
Route 8 | n26-switch6-router19-router1-router13-router6-router9-router8-router10-switch4- n17 | 456 | 10.08% |
Route 9 | n26-switch6-router19-router16-router9-router8-router10-switch4-n17 | 503 | 11.11% |
Route 10 | n31-switch7-router18-router5-router6-router9-router8-router10-switch4-n17 | 428 | 9.35% |
Total | 4258 | 95.05% |
Topology | ns = 32 Nodes | ns = 64 Nodes | |
---|---|---|---|
Scheme | |||
A* search algorithm | 90.15%/0.66 ms | 87.75%/1.88 ms | |
PSO | 93.16%/66,629.38 ms | 90.04%/108,499.41 ms | |
LS-PSO | 99.07%/28,587.81 ms | 95.05%/56,657.07 ms |
Topology | ns = 32 Nodes | ns = 64 Nodes | |
---|---|---|---|
Scheme | |||
A* search algorithm | 90.15% | 87.75% | |
PSO | 93.16% | 90.04% | |
LS-PSO(2) | 99.27% | 96.65% | |
LS-PSO(4) | 99.42% | 97.15% | |
LS-PSO(8) | 99.08% | 96.12% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lin, H.-C.; Wang, P.; Lin, W.-H.; Chao, K.-M.; Yang, Z.-Y. Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme. Symmetry 2021, 13, 1295. https://doi.org/10.3390/sym13071295
Lin H-C, Wang P, Lin W-H, Chao K-M, Yang Z-Y. Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme. Symmetry. 2021; 13(7):1295. https://doi.org/10.3390/sym13071295
Chicago/Turabian StyleLin, Hsiao-Chung, Ping Wang, Wen-Hui Lin, Kuo-Ming Chao, and Zong-Yu Yang. 2021. "Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme" Symmetry 13, no. 7: 1295. https://doi.org/10.3390/sym13071295
APA StyleLin, H. -C., Wang, P., Lin, W. -H., Chao, K. -M., & Yang, Z. -Y. (2021). Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme. Symmetry, 13(7), 1295. https://doi.org/10.3390/sym13071295