IIC Journal of Innovation 19th Edition The Role of Artificial Intelligence in Industry | Page 58

DDoS Attack Identification Contents
FIGURES
Figure 2-1 : IoT connected device forecast . ................................................................................................. 57
Figure 3-1 : Rise in Uplink noise due to DoS may not have an impact on the neighboring cells . In blue is SINR of primary cell , and in red the interference of primary cell . In green , is shown the interference of the first neighbor . ........................................................................................................................... 59
Figure 3-2 : Block-diagram of the ensemble-based approach for time series ensemble-based approach for network anomaly detection under DoS attacks . ................................................................................ 60
Figure 3-3 : Block diagram of the self-supervised approach for anomaly detection from uplink noise rise . ............................................................................................................................................................. 61
Figure 3-4 : Decreasing loss of the self-supervised actor-critic method for anomaly detection . ................ 62 Figure 3-5 : High-level IoT network topology . .............................................................................................. 63 Figure 3-6 : The process used for Smart Contract recording DDOS threats and countermeasures . ........... 65 Figure 4-1 : Timing Advance ( TA ) for DDoS location fingerprinting . ............................................................ 67 Figure 4-2 : IoT security threat environment . .............................................................................................. 68 Figure 4-3 : RRC Connection Reject message per 3GPP TS 36.331 . ............................................................. 69 Figure 4-4 : Contention-based and contention-free RACH procedures . ...................................................... 70 Figure 4-5 : Inter-frequency load balance for covert DDoS countermeasures . ........................................... 71
IIC Journal of Innovation 53