An effective DDoS attack mitigation strategy for IoT using an optimization-based adaptive security model

被引:2
|
作者
Kumar, Saurav [1 ,2 ]
Keshri, Ajit kumar [1 ]
机构
[1] Birla Inst Technol, Comp Sci & Engn, Mesra, Ranchi, India
[2] Amity Univ, Adjunct Fac, Patna, India
关键词
DDoS attacks; Adaptive security; Game theory; Recurrent neural network and bat optimization; Threat analysis; IoT security; INTERNET; ARCHITECTURE;
D O I
10.1016/j.knosys.2024.112052
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things enables the creation of transmitted use cases for interconnected devices and complementary channels. The varied structure of it creates additional security needs and problems. In particular, the safeguards used in the IoT should adjust to the changing environment. One of the major dangers to the World Wide Web (WWW) things is Distributed Denial of Service (DDoS). Therefore, in this work, an intelligent Game Theory-based Adaptive security (GT-AS) mathematical model was developed to maximize the effectiveness of DDoS attack mitigation. Moreover, this strategy can strongly derive the five parameters such as energy channel, memory, intruder, and hybrid. These all can achieve a stronger defense posture against DDoS attacks from the newly designed IoT. Consequently, the Recurrent Bat (RB) framework is developed to classify the nodes into two classes such as trusted node and malicious node. In addition, the proposed frameworks analyze how protection effectiveness and energy consumption interact when evaluating adaptive security techniques. To analyze the effectiveness of the suggested paradigm, researchers also give the outcomes of simulation experiments. Researchers demonstrate that, in comparison to existing models, the developed approach has increased the lifespan of the connected objects by 47 %. Also, the developed strategy has attained better accuracy and lower error rates when comparing traditional strategies. Moreover, the packet delivery ratio is 60 KB, energy consumption is 116 KJ, Mean Location Error is 0.078 and resource usage is 148.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm
    Zhang, Ruizhi
    Cheng, Jieren
    Tang, Xiangyan
    Liu, Qiang
    He, Xiangfeng
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 654 - 669
  • [42] Optimization-Based Feature Selection and Classification with Modified Activation-Tuned Deep BiLSTM for Attack Detection in IoT
    Priyanka
    Kumar, Anoop
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2025,
  • [43] Dynamic multiphase DDoS attack identification and mitigation framework to secure SDN-based fog-empowered consumer IoT Networks
    Chaudhary, Pooja
    Singh, A. K.
    Gupta, B. B.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [44] An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding
    Yang, Zhongguo
    Abbasi, Irshad Ahmed
    Algarni, Fahad
    Ali, Sikandar
    Zhang, Mingzhu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] Multiagent DDOS attack detection model: Optimal trained hybrid classifier and entropy-based mitigation process
    Palusamy, Thiruselvan
    Chelliah, Balasubramanian
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,
  • [46] An intelligent behavioral-based DDOS attack detection method using adaptive time intervals
    Shamekhi, Ali
    Shamsinejad Babaki, Pirooz
    Javidan, Reza
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2185 - 2204
  • [47] Novel fusion strategy for image fusion using rescue hunt optimization-based modified guidance model
    Maddi, Preeti
    Sonnad, Shashidhar
    Hosamani, Sharanbasav
    Savadi, Anuradha
    INTERNATIONAL JOURNAL OF IMAGE AND DATA FUSION, 2024, 15 (02) : 129 - 153
  • [48] Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
    J. Thresa Jeniffer
    A. Chandrasekar
    Peer-to-Peer Networking and Applications, 2022, 15 : 703 - 723
  • [49] Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
    Jeniffer, J. Thresa
    Chandrasekar, A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 703 - 723
  • [50] Smart network security using advanced ensemble-DDoS attack detection and hybrid JA-SLOA-linked optimal routing-based mitigation
    Dora V.R.S.
    Lakshmi V.N.
    Australian Journal of Electrical and Electronics Engineering, 2024, 21 (04): : 374 - 396