Rev 2
Rev 2
INTEGRATED MTECH
in
SOFTWARE ENGINEERING
By
UPPALURU VINITHA REDDY
20MIS0388
Review 2
October, 2024
1. LITERATURE REVIEW
2. GAP IDENTIFICATION
Identify gaps and limitations observed in the existing systems, such as:
Models struggle to handle emerging, unknown attack vectors.
Scaling DDoS defenses is expensive for large IoT deployments.
Integrating explainable AI (XAI) into IoT systems is complex and resource
intensive.
Methods may not cover all potential or emerging IoT attacks.
Security mechanisms may reduce IoT system performance or usability.
3. OBJECTIVE FRAMING
4. PROJECT PLAN
Tasks:
Literature Review:
Research existing DDoS detection methods and machine learning (ML)
techniques used in IoT systems.
Review academic papers on Explainable AI (XAI) for making complex ML
models interpretable to nonexpert users.
Requirement Analysis:
Define key functional requirements such as realtime DDoS detection and
explainable insights for nonexpert users.
Define nonfunctional requirements like scalability, accuracy, and ease of use.
Resource Planning:
Identify necessary hardware (GPUs) and ML frameworks (TensorFlow,
PyTorch) to be used in the project.
Deliverables:
Project Scope Document.
Requirement Specification Report.
List of hardware/software tools required.
Tasks:
Data Collection:
Curate a dataset of DDoS attack patterns targeting IoT devices.
Data Cleaning:
Remove inconsistencies and standardize the dataset for effective training.
Feature Extraction:
Extract key features (e.g., traffic anomalies, patterns) for use in ML models.
Deliverables:
Cleaned and preprocessed dataset.
Feature extraction report.
Tasks:
Model Selection:
Choose ML models suitable for DDoS detection (e.g., decision trees, neural
networks).
Model Training:
Train the selected ML models on the preprocessed dataset to accurately
detect DDoS attacks.
Explainability Integration:
Use Explainable AI techniques to provide clear, understandable insights
about the model’s decisionmaking process.
Deliverables:
Trained ML models with XAI capabilities.
Model performance report.
Tasks:
System Architecture Design:
Design the overall architecture for data input, model execution, and output
interpretation.
Deliverables:
Fully integrated system with DDoS detection and XAI explanations.
Userfriendly interface.
Phase 5: Testing & Evaluation (3 weeks)
Start Date: 15 October 2024
End Date: 31 October 2024
Goal: Test the system for performance, accuracy, and clarity of explanations
provided by the XAI.
Tasks:
Performance Testing:
Evaluate the model’s accuracy and realtime performance.
Explainability Evaluation:
Test the effectiveness of XAI in explaining attack details to nonexpert users.
Deliverables:
Testing report with performance metrics and feedback.
Tasks:
Project Documentation:
Provide detailed documentation, including technical reports and user manuals.
The system begins by monitoring IoT devices, which are increasingly targeted by
cybercriminals due to their connectivity and typically weak security. These devices, when
compromised, to launch DDoS attacks, which overwhelm a network or service with
excessive traffic, rendering it inoperable.
2. Data Collection
The data generated by IoT devices is collected for further analysis. This includes network
traffic data, device logs, and any anomalies in communication patterns. Collecting this
data is essential to detecting abnormal traffic spikes, a common indicator of a DDoS
attack.
3. Data Preprocessing
The collected data is then preprocessed to remove noise and irrelevant information.
Preprocessing involves cleaning, normalizing, and formatting the data, ensuring that the
machine learning model can accurately analyze the incoming traffic for signs of a DDoS
attack.
4. Model Building
Machine learning models are developed to detect DDoS attack patterns within the IoT
device data. These models are trained using datasets that contain examples of both
normal traffic and DDoS attack scenarios. The models learn to identify abnormal traffic
volumes or unusual request patterns typical of a DDoS attack.
After the data is processed through the model, the system classifies it to determine if a
DDoS attack is occurring. The classification result will indicate whether the incoming
traffic is normal or if it aligns with patterns typically associated with a DDoS attack, such
as a sudden surge in traffic volume targeting a specific service or device.
6. Explainable AI (XAI)
8. Data Repository
All classified DDoS attacks, along with their analysis and explanations, are stored in a
data repository. This repository allows for historical tracking of DDoS incidents, enabling
the system to refine its detection methods over time and providing security teams with
data for post-incident analysis.
9. Explanation Generation
This stage translates the technical explanation of the DDoS attack into a format that can
be easily understood by non-technical stakeholders. The system provides a clear and
concise explanation of the DDoS attack, including why it was classified as such, the
impact on the IoT devices, and potential mitigation strategies.
The results and explanations are presented via a user interface, offering users a detailed
view of the detected DDoS attack. The UI allows for quick understanding of the attack’s
nature, severity, and suggested responses, ensuring that users can take appropriate action
to defend their systems from ongoing or future DDoS threats.
6.IMPLEMENTATION RESULTS
SIMPLE ANALYSIS OF DATA
EXPLORATORY DATA ANALYSIS
MODEL BUILDING
1.DECISION TREE
ROC CURVE
CONFUSION MATRIX
PRECISION- RECALL CURVE
2. KNN WITH PCA APPLIED
3. LOGISTIC REGRESSION