Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data t...
Saved in:
Published in | Qubahan Academic Journal Vol. 4; no. 2; pp. 569 - 581 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Qubahan
30.06.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data transmission capacity and also the viruses' ability to operate under-the-roof while using the mobile nodes which helps them move covertly. On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. Moreover, the paper demonstrates the proper job of the detectors in keeping the networks to be safe. The algorithms that are tended to do the machine learning which is about past occurrences of these attacks and then soon to come up with new solutions which somehow or very likely could control or minimize attacks that might be prejudicial are the typical way that attacks are prevented. This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. Our results indicate that Random Forest outperforms the other models, achieving an accuracy of 99.2%, a false positive rate of 0.8%, and an AUC-ROC of 0.997. |
---|---|
AbstractList | The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data transmission capacity and also the viruses' ability to operate under-the-roof while using the mobile nodes which helps them move covertly. On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. Moreover, the paper demonstrates the proper job of the detectors in keeping the networks to be safe. The algorithms that are tended to do the machine learning which is about past occurrences of these attacks and then soon to come up with new solutions which somehow or very likely could control or minimize attacks that might be prejudicial are the typical way that attacks are prevented. This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. Our results indicate that Random Forest outperforms the other models, achieving an accuracy of 99.2%, a false positive rate of 0.8%, and an AUC-ROC of 0.997. |
Author | Abdulkadhum Abbas, Sharaf Aldeen Abdu Ibrahim, Abdullahi |
Author_xml | – sequence: 1 givenname: Sharaf Aldeen surname: Abdulkadhum Abbas fullname: Abdulkadhum Abbas, Sharaf Aldeen – sequence: 2 givenname: Abdullahi surname: Abdu Ibrahim fullname: Abdu Ibrahim, Abdullahi |
BookMark | eNp1kU1PAjEQhhuDiYocvfcPrG4_9qNHA6IkqInCeTPttlrFrbZFQvzzFlBjTDzNzDvPvId5j1Cvc51G6ITkp7wmJTl7g6fTd95RKGqyhw5plYuspnnZ-9UfoEEIVuYJySnj1SH6GDsfrVnb7gFP3AxPOuMhRL9Ucek1nofN4hrUo-00nmrw3UYwzuPRyN3j8xhBPeOVjQnAI5surVxG3eKhe3ldxgRnEkKa79x2wgm70XHl_HM4RvsGFkEPvmofzccXs-FVNr29nAzPp5miRUUyYzgnRHBWGtFKWbakgJJUBQWtjMpBaiWkEJK3VHFpuOSaKFMwYQQtlCKsjyY739bBU_Pq7Qv4dePANlvB-YcG0hPUQjdMtqYkVOWFFrxqBTBJKq6LSklWsxqSV7bzUt6F4LX58SN5sw2iSUE030Eknv3hlY0QreuiB7v45-oTTuyS-w |
CitedBy_id | crossref_primary_10_1007_s40808_024_02254_2 |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.48161/qaj.v4n2a581 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Open Access Full Text url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2709-8206 |
EndPage | 581 |
ExternalDocumentID | oai_doaj_org_article_3bdf612c05e947d9a3b174e57cb3838a 10_48161_qaj_v4n2a581 |
GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ M~E |
ID | FETCH-LOGICAL-c2571-ff44119436f9dbb6d15a61752aecfc0abec9b99b4d2c4bf4b4e1cf539f925cc13 |
IEDL.DBID | DOA |
ISSN | 2709-8206 |
IngestDate | Wed Aug 27 01:24:22 EDT 2025 Thu Apr 24 23:12:21 EDT 2025 Tue Jul 01 02:24:29 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://creativecommons.org/licenses/by-nc-nd/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2571-ff44119436f9dbb6d15a61752aecfc0abec9b99b4d2c4bf4b4e1cf539f925cc13 |
OpenAccessLink | https://doaj.org/article/3bdf612c05e947d9a3b174e57cb3838a |
PageCount | 13 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_3bdf612c05e947d9a3b174e57cb3838a crossref_primary_10_48161_qaj_v4n2a581 crossref_citationtrail_10_48161_qaj_v4n2a581 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-06-30 |
PublicationDateYYYYMMDD | 2024-06-30 |
PublicationDate_xml | – month: 06 year: 2024 text: 2024-06-30 day: 30 |
PublicationDecade | 2020 |
PublicationTitle | Qubahan Academic Journal |
PublicationYear | 2024 |
Publisher | Qubahan |
Publisher_xml | – name: Qubahan |
SSID | ssib058102347 |
Score | 2.26065 |
Snippet | The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became... |
SourceID | doaj crossref |
SourceType | Open Website Enrichment Source Index Database |
StartPage | 569 |
SubjectTerms | Cyber Attacks Cybersecurity IDs |
Title | Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks |
URI | https://doaj.org/article/3bdf612c05e947d9a3b174e57cb3838a |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwsCAaJ8yQNiImoT2008FtqqILULrdQtss82qkAplMKCxG_nbKdVGRALS4boYkXni-695OUdIZdtmSmXQZowZVjCHbdJYcAkIk8VsMxJq4PaYtQeTPj9VEw3Rn15TVi0B46JazJtHHZhaAkreW6kYhpBtBU5aCRXRYBG2PM2yBRWkii8IwHPo6kmLxDWNF9x4Q9eZUoU6Y8mtOHVH5pKf4_s1miQduJd7JMtWx2Qzz5C4ln4_4jezcf0rnILFX1e3xeWho_8dBhEkJbW_qiPFMEn7XbnD7SzXCp4ov4F66yiXW-M62daWUPjBAcMTnzvMtSrgfylGDaKavC3QzLp98a3g6SekZAAPmxp4hzimVRy1nbSaN02qVAISkSmLDhoKdwiqaXU3GTAteOa2xScYNLJTACk7IhsV_PKHhNqhUT4VQAwQNpQcA02R8KjEVMAkrK8Qa5XSSuhNhD3cyyeSyQSIccl5rhc5bhBrtbhL9E547fAG78D6yBveB1OYBmUdRmUf5XByX8sckp2MsQsUQ54RrZxZ-05Yo6lvgjlhcfhV-8b-1Hafw |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fortifying+IoT+Infrastructure+Using+Machine+Learning+for+DDoS+Attack+within+Distributed+Computing-based+Routing+in+Networks&rft.jtitle=Qubahan+Academic+Journal&rft.au=Sharaf+Aldeen+Abdulkadhum+Abbas&rft.au=Abdullahi+Abdu+Ibrahim&rft.date=2024-06-30&rft.pub=Qubahan&rft.eissn=2709-8206&rft.volume=4&rft.issue=2&rft_id=info:doi/10.48161%2Fqaj.v4n2a581&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_3bdf612c05e947d9a3b174e57cb3838a |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2709-8206&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2709-8206&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2709-8206&client=summon |