An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 40 条
  • [1] A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing
    Lawal, Muhammad Aminu
    Shaikh, Riaz Ahmed
    Hassan, Syed Raheel
    LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G, 2021, 182 : 13 - 20
  • [2] Machine learning-based DDOS attack detection and mitigation in SDNs for IoT environments
    Kavitha, D.
    Ramalakshmi, R.
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [3] Model based IoT security framework using multiclass adaptive boosting with SMOTE
    Dash, Pandit Byomakesha
    Nayak, Janmenjoy
    Naik, Bighnaraj
    Oram, Etuari
    Islam, S. K. Hafizul
    SECURITY AND PRIVACY, 2020, 3 (05):
  • [4] Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model
    Alashhab, Abdussalam Ahmed
    Zahid, Mohd Soperi
    Isyaku, Babangida
    Elnour, Asma Abbas
    Nagmeldin, Wamda
    Abdelmaboud, Abdelzahir
    Abdullah, Talal Ali Ahmed
    Maiwada, Umar Danjuma
    IEEE ACCESS, 2024, 12 : 51630 - 51649
  • [5] Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
    Bhardwaj, Sonam
    Dave, Mayank
    TELECOMMUNICATION SYSTEMS, 2024, 85 (04) : 601 - 621
  • [6] Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment
    Katib, Iyad
    Ragab, Mahmoud
    MATHEMATICS, 2023, 11 (08)
  • [7] Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning
    Huraj, Ladislav
    Horak, Tibor
    Strelec, Peter
    Tanuska, Pavol
    APPLIED SCIENCES-BASEL, 2021, 11 (04): : 1 - 18
  • [8] Secure SDN–IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach
    Mimi Cherian
    Satishkumar L. Varma
    Journal of Network and Systems Management, 2023, 31
  • [9] Dynamic multiphase DDoS attack identification and mitigation framework to secure SDN-based fog-empowered consumer IoT Networks
    Chaudhary, Pooja
    Singh, A. K.
    Gupta, B. B.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [10] Optimization-Based Feature Selection and Classification with Modified Activation-Tuned Deep BiLSTM for Attack Detection in IoT
    Priyanka
    Kumar, Anoop
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2025,