An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] SDN-based Network Security Functions for Effective DDoS Attack Mitigation
    Hyun, Daeyoung
    Kim, Jinyoug
    Hong, Dongjin
    Jeong, Jaehoon
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 834 - 839
  • [2] IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN
    Yang, Yinqi
    Wang, Jian
    Zhai, Baoqin
    Liu, Jiqiang
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 3 - 17
  • [3] A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing
    Lawal, Muhammad Aminu
    Shaikh, Riaz Ahmed
    Hassan, Syed Raheel
    LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G, 2021, 182 : 13 - 20
  • [4] Security Integration in DDoS Attack Mitigation Using Access Control Lists
    Yadav, Sumit Kumar
    Sharma, Kavita
    Arora, Arushi
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2018, 9 (01) : 56 - 76
  • [5] Entropy based earlier detection and mitigation of DDOS attack using stochastic method in SDN_IOT
    Varalakshmi, I.
    Thenmozhi, M.
    Measurement: Sensors, 2025, 39
  • [6] Machine learning-based DDOS attack detection and mitigation in SDNs for IoT environments
    Kavitha, D.
    Ramalakshmi, R.
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [7] Semi-supervised deep-ELM for DDoS attack detection and mitigation using the OptimalLink model in IoT networks
    Rajkumar, K.
    Shalinie, S. Mercy
    COMPUTERS & SECURITY, 2025, 152
  • [8] Classification of IoT based DDoS Attack using Machine Learning Techniques
    Fasih, Muhammad Ashfaq
    Maryam, Malik
    Urooj, Fatima
    Shahzad, Muhammad Khuram
    PROCEEDINGS OF THE 2022 16TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2022), 2022,
  • [9] A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets
    Hu, Jiamin
    Yang, Xiaofan
    PLOS ONE, 2024, 19 (12):
  • [10] DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
    Li, Chunhui
    Wang, Xiaoying
    Zhang, Qingjie
    Liang, Jiaye
    Zhang, Aijing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (01): : 645 - 674