An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 40 条
  • [31] Enhancing IOT based software defect prediction in analytical data management using war strategy optimization and Kernel ELM
    Zada, Islam
    Alshammari, Abdullah
    Mazhar, Ahmad A.
    Aldaeej, Abdullah
    Qasem, Sultan Noman
    Amjad, Kashif
    Alkhateeb, Jawad H.
    WIRELESS NETWORKS, 2024, 30 (09) : 7207 - 7225
  • [32] Modeling and Optimization of IoT Factors to Enhance Agile Manufacturing Strategy-based Production System Using SCM and RSM
    Vates, Umesh Kumar
    Sharma, Bhupendra Prakash
    Kanu, Nand Jee
    Gupta, Eva
    Singh, Gyanendra Kumar
    SMART SCIENCE, 2022, 10 (02) : 158 - 173
  • [33] A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications
    Kavin, Balasubramanian Prabhu
    Ganapathy, Sannasi
    COMPUTER NETWORKS, 2019, 151 : 181 - 190
  • [34] Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features
    Sakthipriya, N.
    Govindasamy, V.
    Akila, V.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1467 - 1485
  • [35] Spectrum Sensing and Allocation Strategy for IoT Devices Using Continuous-Time Markov Chain-Based Game Theory Model
    Surekha, Sala
    Rahman, Md Zia Ur
    IEEE SENSORS LETTERS, 2022, 6 (04)
  • [36] APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization
    Palekar, Supriya
    Radhika, Y.
    CYBERNETICS AND SYSTEMS, 2024, 55 (04) : 823 - 847
  • [37] An effective hybrid attention model for crop yield prediction using IoT-based three-phase prediction with an improved sailfish optimizer
    Kumar, B. Varun
    Rao, P. V. Gopi Krishna
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255
  • [38] Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT
    Gong, Yiguang
    Chen, Kai
    Niu, Tianyu
    Liu, Yunping
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [39] A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
    Anjinappa, Gopinath
    Prabhakar, Divakar Bangalore
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2024, 20 (05) : 579 - 592
  • [40] An effective attack detection framework using multi-scale depth-wise separable 1DCNN via fused grasshopper-based lemur optimizer in IoT routing system
    Marapatla, Ajay Dilip Kumar
    Ilavarasan, E.
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (03): : 1741 - 1762