Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks

The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data t...

Full description

Saved in:
Bibliographic Details
Published inQubahan Academic Journal Vol. 4; no. 2; pp. 569 - 581
Main Authors Abdulkadhum Abbas, Sharaf Aldeen, Abdu Ibrahim, Abdullahi
Format Journal Article
LanguageEnglish
Published Qubahan 30.06.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data transmission capacity and also the viruses' ability to operate under-the-roof while using the mobile nodes which helps them move covertly. On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. Moreover, the paper demonstrates the proper job of the detectors in keeping the networks to be safe. The algorithms that are tended to do the machine learning which is about past occurrences of these attacks and then soon to come up with new solutions which somehow or very likely could control or minimize attacks that might be prejudicial are the typical way that attacks are prevented. This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. Our results indicate that Random Forest outperforms the other models, achieving an accuracy of 99.2%, a false positive rate of 0.8%, and an AUC-ROC of 0.997.
AbstractList The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data transmission capacity and also the viruses' ability to operate under-the-roof while using the mobile nodes which helps them move covertly. On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. Moreover, the paper demonstrates the proper job of the detectors in keeping the networks to be safe. The algorithms that are tended to do the machine learning which is about past occurrences of these attacks and then soon to come up with new solutions which somehow or very likely could control or minimize attacks that might be prejudicial are the typical way that attacks are prevented. This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. Our results indicate that Random Forest outperforms the other models, achieving an accuracy of 99.2%, a false positive rate of 0.8%, and an AUC-ROC of 0.997.
Author Abdulkadhum Abbas, Sharaf Aldeen
Abdu Ibrahim, Abdullahi
Author_xml – sequence: 1
  givenname: Sharaf Aldeen
  surname: Abdulkadhum Abbas
  fullname: Abdulkadhum Abbas, Sharaf Aldeen
– sequence: 2
  givenname: Abdullahi
  surname: Abdu Ibrahim
  fullname: Abdu Ibrahim, Abdullahi
BookMark eNp1kU1PAjEQhhuDiYocvfcPrG4_9qNHA6IkqInCeTPttlrFrbZFQvzzFlBjTDzNzDvPvId5j1Cvc51G6ITkp7wmJTl7g6fTd95RKGqyhw5plYuspnnZ-9UfoEEIVuYJySnj1SH6GDsfrVnb7gFP3AxPOuMhRL9Ucek1nofN4hrUo-00nmrw3UYwzuPRyN3j8xhBPeOVjQnAI5surVxG3eKhe3ldxgRnEkKa79x2wgm70XHl_HM4RvsGFkEPvmofzccXs-FVNr29nAzPp5miRUUyYzgnRHBWGtFKWbakgJJUBQWtjMpBaiWkEJK3VHFpuOSaKFMwYQQtlCKsjyY739bBU_Pq7Qv4dePANlvB-YcG0hPUQjdMtqYkVOWFFrxqBTBJKq6LSklWsxqSV7bzUt6F4LX58SN5sw2iSUE030Eknv3hlY0QreuiB7v45-oTTuyS-w
CitedBy_id crossref_primary_10_1007_s40808_024_02254_2
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.48161/qaj.v4n2a581
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Open Access Full Text
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2709-8206
EndPage 581
ExternalDocumentID oai_doaj_org_article_3bdf612c05e947d9a3b174e57cb3838a
10_48161_qaj_v4n2a581
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
M~E
ID FETCH-LOGICAL-c2571-ff44119436f9dbb6d15a61752aecfc0abec9b99b4d2c4bf4b4e1cf539f925cc13
IEDL.DBID DOA
ISSN 2709-8206
IngestDate Wed Aug 27 01:24:22 EDT 2025
Thu Apr 24 23:12:21 EDT 2025
Tue Jul 01 02:24:29 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://creativecommons.org/licenses/by-nc-nd/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2571-ff44119436f9dbb6d15a61752aecfc0abec9b99b4d2c4bf4b4e1cf539f925cc13
OpenAccessLink https://doaj.org/article/3bdf612c05e947d9a3b174e57cb3838a
PageCount 13
ParticipantIDs doaj_primary_oai_doaj_org_article_3bdf612c05e947d9a3b174e57cb3838a
crossref_primary_10_48161_qaj_v4n2a581
crossref_citationtrail_10_48161_qaj_v4n2a581
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-06-30
PublicationDateYYYYMMDD 2024-06-30
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-06-30
  day: 30
PublicationDecade 2020
PublicationTitle Qubahan Academic Journal
PublicationYear 2024
Publisher Qubahan
Publisher_xml – name: Qubahan
SSID ssib058102347
Score 2.26065
Snippet The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became...
SourceID doaj
crossref
SourceType Open Website
Enrichment Source
Index Database
StartPage 569
SubjectTerms Cyber Attacks
Cybersecurity
IDs
Title Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
URI https://doaj.org/article/3bdf612c05e947d9a3b174e57cb3838a
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwsCAaJ8yQNiImoT2008FtqqILULrdQtss82qkAplMKCxG_nbKdVGRALS4boYkXni-695OUdIZdtmSmXQZowZVjCHbdJYcAkIk8VsMxJq4PaYtQeTPj9VEw3Rn15TVi0B46JazJtHHZhaAkreW6kYhpBtBU5aCRXRYBG2PM2yBRWkii8IwHPo6kmLxDWNF9x4Q9eZUoU6Y8mtOHVH5pKf4_s1miQduJd7JMtWx2Qzz5C4ln4_4jezcf0rnILFX1e3xeWho_8dBhEkJbW_qiPFMEn7XbnD7SzXCp4ov4F66yiXW-M62daWUPjBAcMTnzvMtSrgfylGDaKavC3QzLp98a3g6SekZAAPmxp4hzimVRy1nbSaN02qVAISkSmLDhoKdwiqaXU3GTAteOa2xScYNLJTACk7IhsV_PKHhNqhUT4VQAwQNpQcA02R8KjEVMAkrK8Qa5XSSuhNhD3cyyeSyQSIccl5rhc5bhBrtbhL9E547fAG78D6yBveB1OYBmUdRmUf5XByX8sckp2MsQsUQ54RrZxZ-05Yo6lvgjlhcfhV-8b-1Hafw
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fortifying+IoT+Infrastructure+Using+Machine+Learning+for+DDoS+Attack+within+Distributed+Computing-based+Routing+in+Networks&rft.jtitle=Qubahan+Academic+Journal&rft.au=Sharaf+Aldeen+Abdulkadhum+Abbas&rft.au=Abdullahi+Abdu+Ibrahim&rft.date=2024-06-30&rft.pub=Qubahan&rft.eissn=2709-8206&rft.volume=4&rft.issue=2&rft_id=info:doi/10.48161%2Fqaj.v4n2a581&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_3bdf612c05e947d9a3b174e57cb3838a
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2709-8206&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2709-8206&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2709-8206&client=summon