An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 40 条
  • [21] Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks
    Alhazmi, Lamia
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 330 - 338
  • [22] An intelligent DDoS attack detection tree-based model using Gini index feature selection method
    Bouke, Mohamed Aly
    Abdullah, Azizol
    ALshatebi, Sameer Hamoud
    Abdullah, Mohd Taufik
    El Atigh, Hayate
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 98
  • [23] Harmony search Hawks optimization-based Deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization
    Om Prakash, P. G.
    Maram, Balajee
    Nalinipriya, G.
    Cristin, R.
    INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2021, 19 (04)
  • [24] Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare
    Mishra, Anand Muni
    Shahare, Yogesh Ramdas
    Shukla, Piyush Kumar
    Husain, Akhtar
    Singh, Santar Pal
    Alyami, Sultan
    Alghamdi, Abdullah
    Ahanger, Tariq Ahamed
    COMPUTER COMMUNICATIONS, 2023, 212 : 407 - 419
  • [25] Enhance the Security of the Cloud Using a Hybrid Optimization-Based Proxy Re-Encryption Technique Considered Blockchain
    Alutaibi, Ahmed I.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (08) : 760 - 771
  • [26] An Optimized Deep Learning Based Security Enhancement and Attack Detection on IoT Using IDS and KH-AES for Smart Cities
    Duraisamy, Ayyer
    Subramaniam, Muthusamy
    Rene Robin, Chinnanadar Ramachandran
    STUDIES IN INFORMATICS AND CONTROL, 2021, 30 (02): : 121 - 131
  • [27] A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation
    Ahmadi, Khatereh
    Javidan, Reza
    IET INFORMATION SECURITY, 2024, 2024
  • [28] A probabilistic automata-based network attack-defense game model for data security by using security service chain
    Liu, Hao
    Wang, Chong
    Wu, Zhonghai
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2025, 28 (01):
  • [29] A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST
    Prathapchandran, K.
    Janani, T.
    COMPUTER NETWORKS, 2021, 198
  • [30] A Subjective Logical Framework-Based Trust Model for Wormhole Attack Detection and Mitigation in Low-Power and Lossy (RPL) IoT-Networks
    Javed, Sarmad
    Sajid, Ahthasham
    Kiren, Tayybah
    Khan, Inam Ullah
    Dewi, Christine
    Cauteruccio, Francesco
    Christanto, Henoch Juli
    INFORMATION, 2023, 14 (09)