An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework
    Revathi, M.
    Ramalingam, V. V.
    Amutha, B.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2417 - 2441
  • [22] Research of Web Personalized Tutoring Using Multifactor Optimization-based Fuzzy Evaluation and Adaptive Strategy
    Gu, Tiejun
    Li, Yi
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, : 196 - 203
  • [23] Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model
    Alashhab, Abdussalam Ahmed
    Zahid, Mohd Soperi
    Isyaku, Babangida
    Elnour, Asma Abbas
    Nagmeldin, Wamda
    Abdelmaboud, Abdelzahir
    Abdullah, Talal Ali Ahmed
    Maiwada, Umar Danjuma
    IEEE ACCESS, 2024, 12 : 51630 - 51649
  • [24] DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization
    Hussan, M. I. Thariq
    Reddy, G. Vinoda
    Anitha, P. T.
    Kanagaraj, A.
    Naresh, P.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4469 - 4490
  • [25] FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks
    Khedr, Walid I.
    Gouda, Ameer E.
    Mohamed, Ehab R.
    IEEE ACCESS, 2023, 11 : 28934 - 28954
  • [26] LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem
    Bhale, Pradeepkumar
    Biswas, Santosh
    Nandi, Sukumar
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [27] An optimized weighted voting based ensemble model for DDoS attack detection and mitigation in SDN environment
    Maheshwari, Aastha
    Mehraj, Burhan
    Khan, Mohd Shaad
    Idrisi, Mohd Shaheem
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 89
  • [28] Stealthy attack detection using convex optimization-based RPCA algorithm
    Arulini, Sheryl A.
    Jawhar, Joseph
    ELECTRIC POWER SYSTEMS RESEARCH, 2020, 187
  • [29] DDoS attack modeling and resistance using trust based protocol for the security of Internet of Things
    Khan, A. B. Feroz
    Hussain, Mohammed Muzaffar
    Devi, S. Kalpana
    Gunavathie, M. A.
    JOURNAL OF ENGINEERING RESEARCH, 2023, 11 (02):
  • [30] Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning
    Huraj, Ladislav
    Horak, Tibor
    Strelec, Peter
    Tanuska, Pavol
    APPLIED SCIENCES-BASEL, 2021, 11 (04): : 1 - 18