An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 40 条
  • [11] Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
    Ullah, Inam
    Noor, Asra
    Nazir, Shah
    Ali, Farhad
    Ghadi, Yazeed Yasin
    Aslam, Nida
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (05) : 5870 - 5899
  • [12] SDN-based DDoS Attack Mitigation Scheme using Convolution Recursively Enhanced Self Organizing Maps
    Pillutla Harikrishna
    A Amuthan
    Sādhanā, 2020, 45
  • [13] Secure SDN-IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach
    Cherian, Mimi
    Varma, Satishkumar L.
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (03)
  • [14] SDN-based DDoS Attack Mitigation Scheme using Convolution Recursively Enhanced Self Organizing Maps
    Harikrishna, Pillutla
    Amuthan, A.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2020, 45 (01):
  • [15] A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials
    Almazroi, Abdulwahab Ali
    Alkinani, Monagi H.
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (09) : 11991 - 12004
  • [16] Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization-based cluster head selection
    Das, Anupam
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (11)
  • [17] Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks
    Velliangiri, S.
    Karthikeyan, P.
    Vinoth Kumar, V.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2021, 33 (03) : 405 - 424
  • [18] Network Based Detection of IoT Attack Using AIS-IDS Model
    Sabitha, R.
    Gopikrishnan, S.
    Bejoy, B. J.
    Anusuya, V
    Saravanan, V
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (03) : 1543 - 1566
  • [19] Anti-DDoS Firewall; A Zero-Sum Mitigation Game Model for Distributed Denial of Service Attack Using Linear Programming
    Amadi, E. C.
    Eheduru, G. E.
    Eze, F. U.
    Ikerionwu, C.
    Okafor, K. C.
    2017 IEEE 4TH INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2017, : 27 - 36
  • [20] Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
    Inam Ullah
    Asra Noor
    Shah Nazir
    Farhad Ali
    Yazeed Yasin Ghadi
    Nida Aslam
    The Journal of Supercomputing, 2024, 80 : 5870 - 5899