Distributed denial of service attack detection and mitigation strategy in 5G-enabled internet of things networks with adaptive cascaded gated recurrent unit

被引:0
作者
Akhtar, Md. Mobin [1 ]
Alasmari, Sultan Ali [2 ,3 ]
Haidar, S. K. Wasim [4 ]
Alzubaidi, Ali Abdulaziz [5 ]
机构
[1] Riyadh Elm Univ, Coll Appl Med Sci, Dept Basic Sci, Riyadh, Saudi Arabia
[2] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Syst, Majmaah 11952, Saudi Arabia
[3] Riyadh Elm Univ, Coll Technol & Business, King Fahad Rd, Riyadh 12734, Saudi Arabia
[4] UTAS Salalah, Coll Comp & Informat Sci, Informat Technol Dept, Salalah, Oman
[5] Umm Al Qura Univ, Coll Comp, Mecca, Saudi Arabia
关键词
Attack detection and mitigation; Distributed denial of service; Adaptive cascaded gated recurrent unit; Exploration or exploitation-based pine cone optimization; Optimal routing; Throughput; NEURAL-NETWORK; SYSTEM;
D O I
10.1007/s12083-024-01894-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In real-time manner, the deployment of 5G network is an essential role in Internet of Things (IoT) by facilitating with massive Machine-Type Communications (mMTC). This advancement in IoT technology becomes crucial for enabling a wide variety of applications like intelligent manufacturing, smart energy grids, and development of smart cities. The most commonly known attacks in IoT are Distributed Denial of Service (DDoS) that causes huge traffic flow into the large number of devices and misleading transmission of data packets. However, the defensive measures in existing approaches are largely ineffective. Among various cyber threats, the defense against DDoS attacks is particularly challenging due to their dynamic nature. Also, the accurate detection of DDoS is a quite challenging in the traditional methods of 5G-based IoT networks. In order to resolve these issues, the research work implements an effective model using optimal routing to safeguard the 5G-based IoT networks. The advancement of these model helps to mitigate the DDoS attack that offer effective data transmission. Initially, the input data is accumulated from IoT network. Further, the DDoS attack detection is performed via the developed Adaptive Cascaded Gated Recurrent Unit (ACGRU), in which the parameters are optimally tuned using Exploration or Exploitation-based Pine Cone Optimization (EEPCO) algorithm. The detected node is further mitigated for an effective and secured data transfer. In order to achieve that, the optimal routing is done by using EEPCO. To attain better optimal routing, the objective functions are formulated with constraints like trust, energy and throughput. Throughout the experimental analysis, the diverse positive measures like accuracy, specificity, sensitivity, and precision are validated to show the effective outcome as 94.05, 94.69, 93.39 and 93.68 while detecting the attacks. On considering statistical analysis, the performance of the developed EEPCO algorithm attains 5.4%, 7.3%, 33.8% and 11.5% enhanced than DSO, EVO, GFROA and PCOA in terms of median. Therefore, the security of the IoT network is improved by optimal routing and helpful for transmitting the data without any delay.
引用
收藏
页数:31
相关论文
共 56 条
  • [1] Multilevel Deep Neural Network Approach for Enhanced Distributed Denial-of-Service Attack Detection and Classification in Software-Defined Internet of Things Networks
    Abid, Yawar Abbas
    Wu, Jinsong
    Xu, Guangquan
    Fu, Shihui
    Waqas, Muhammad
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 24715 - 24725
  • [2] Distributed Denial of Service Attack Detection for the Internet of Things Using Hybrid Deep Learning Model
    Ahmim, Ahmed
    Maazouzi, Faiz
    Ahmim, Marwa
    Namane, Sarra
    Dhaou, Imed Ben
    [J]. IEEE ACCESS, 2023, 11 : 119862 - 119875
  • [3] MapReduce with Deep Learning Framework for Student Health Monitoring System using IoT Technology for Big Data
    Akhtar, Md. Mobin
    Shatat, Abdallah Saleh Ali
    Al-Hashimi, Mukhtar
    Zamani, Abu Sarwar
    Rizwanullah, Mohammed
    Mohamed, Sara Saadeldeen Ibrahim
    Ayub, Rashid
    [J]. JOURNAL OF GRID COMPUTING, 2023, 21 (04)
  • [4] IoMT-based smart healthcare monitoring system using adaptive wavelet entropy deep feature fusion and improved RNN
    Akhtar, Md Mobin
    Shatat, Raid Saleh Ali
    Shatat, Abdallah Saleh Ali
    Hameed, Shabi Alam
    Alnajdawi, Sakher Ibrahim
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 17353 - 17390
  • [5] Alashhab AA, 2022, INT J ADV COMPUT SC, V13, P371
  • [6] Enhancing DDoS Attack Detection Using Snake Optimizer With Ensemble Learning on Internet of Things Environment
    Aljebreen, Mohammed
    Mengash, Hanan Abdullah
    Arasi, Munya A.
    Aljameel, Sumayh S.
    Salama, Ahmed S.
    Hamza, Manar Ahmed
    [J]. IEEE ACCESS, 2023, 11 : 104745 - 104753
  • [7] Cyber-Attack Detection and Mitigation Using SVM for 5G Network
    Alshunaifi, Sulaiman Yousef
    Mishra, Shailendra
    AlShehri, Mohammed Abdul Rahman
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01) : 13 - 28
  • [8] Alzhrani RM, 2023, arXiv, Cryptography and Security, P2311
  • [9] Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT
    Aslam, Muhammad
    Ye, Dengpan
    Tariq, Aqil
    Asad, Muhammad
    Hanif, Muhammad
    Ndzi, David
    Chelloug, Samia Allaoua
    Abd Elaziz, Mohamed
    Al-Qaness, Mohammed A. A.
    Jilani, Syeda Fizzah
    [J]. SENSORS, 2022, 22 (07)
  • [10] Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
    Aswad, Firas Mohammed
    Ahmed, Ali Mohammed Saleh
    Alhammadi, Nafea Ali Majeed
    Khalaf, Bashar Ahmad
    Mostafa, Salama A.
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)