ENHANCING THE RESILIENCE OF IOT NETWORKS: STRATEGIES AND MEASURES FOR MITIGATING DDOS ATTACKS
Authors:
Mehak Fatima, Arshad Ali, Muhammad Tausif Afzal Rana, Muhammad Ahmad, Fakhar Un Nisa, Hamayun Khan, Hafiz Umar Farooq, Muhammad Ahsan Ur RaheemDOI NO:
https://doi.org/10.26782/jmcms.2024.10.00009Abstract:
The Internet of Things (IoTs) are emerging and become a vital need in our daily routine. The privacy protection and insecurity of these IoT-based devices face many challenges. Distributed denial of service (DDoS) attacks in IoT networks become a significant growing challenge that is addressed in this research. The resilience and strategy for IoT devices due to distributed denial of service (DDoS) attacks assess current security measures by proposing modern procedures to upgrade the strength of IoT frameworks. This article proposes a mechanism that mitigiates the effects of DDoS attacks in IoTs, that cause significant destruction to existing systems. Utilizing secondary data from Kaggle, the machine is trained and tested. Our proposed approach incorporates descriptive statistics, correlations, t-tests, chi-square tests, and regression analyses to supply a systematic understanding of IoT security by critically analyzing the existing variants of numerous DDoS attacks, Security issues in IoTs, and creation of them in Botnets or zombies. Our findings show that the proposed security techniques are viable and detection rates correlate with security viability. The proposed model asses various network threat and cybersecurity arrangements for mitigating DDoS attacks in IoT’s and outperforms the previously implemented Web Application Firewall (WAF), Bot Mitigation, Resource Prioritisation, and Content Delivery Networks (CDNs)based DDoS mitigation techniques by 80.5%, 88%, 86% in terms of effectiveness, T-test, chi test, and correlation.Keywords:
DDoS attacks,Data analysis,IoT security,Security measures,Refference:
I. Aldawood, H., & Skinner, G.. Educating and raising awareness on cyber security social engineering: A literature review. In 2018 IEEE International Conference on Teaching, assessment, and Learning for Engineering (TALE), vol 10, no. 5, pp. 62-68). IEEE. 2018, December
II. Al-Hadhrami, Y., & Hussain, F. K. DDoS attacks in IoT networks: a comprehensive systematic literature review. World Wide Web, Vol 24, no 3, pp 971-1001. 2021.
III. Ali, I., Sabir, S., & Ullah, Z. Internet of things security, device authentication and access control: a review. arXiv preprint arXiv: Vol 14, no 2, pp 1901-1920, 2019.
IV. Hassan, H. Khan, I. Uddin, A. Sajid, “Optimal Emerging trends of Deep Learning Technique for Detection based on Convolutional Neural Network”, Bulletin of Business and Economics (BBE), Vol.12, No.4, pp. 264-273, 2023
V. H. Khan, A. Ali, S. Alshmrany, “Energy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs”, Computers, Materials & Continua, Vol.74, No.1, pp. 965-981, 2023
VI. H. Sarwar, H. Khan, I. Uddin, R. Waleed, S. Tariq, “An Efficient E-Commerce Web Platform Based on Deep Integration of MEAN Stack Technologies”, Bulletin of Business and Economics (BBE), Vol. 12, No.4, pp. 447-453, 2023
VII. Hammad. A , E. Zhao, “Mitigating link insecurities in smart grids via QoS multi-constraint routing“, In 2016 IEEE International Conference on Communications Workshops (ICC)”, pp. 380-386. 2016
VIII. H. Khan, I. Uddin, A. Ali, M. Husain, “An Optimal DPM Based Energy-Aware Task Scheduling for Performance Enhancement in Embedded MPSoC” Computers, Materials & Continua, Vol.74, No.1, pp. 2097-2113, 2023
IX. Hammad, A. A., Ahmed, “Deep Reinforcement Learning for Adaptive Cyber Defense in Network Security”, In Proceedings of the Cognitive Models and Artificial Intelligence Conference, pp. 292-297, 2016
X. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems,” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018
XI. Hossein Shirazi, Bruhadeshwar. B,”Kn0w Thy Doma1n Name”: Unbiased Phishing Detection Using Domain Name Based Features. In Proceedings Of The 23nd Acm On Symposium On Access Control Models And Technologies (Sacmat ’18). Association For Computing Machinery, New York, Ny, Usa, pp. 69-75, 2018
XII. Hussain, S., Rajput, U. A., Kazi, Q. A., & Mastoi, S, “Numerical investigation of thermohydraulic performance of triple concentric-tube heat exchanger with longitudinal fins”, J. Mech. Cont. & Math. Sci, Vol. 16, No. 8, pp 61-73, 2021.
XIII. H. Khan, S. Ahmad, N. Saleem, M. U. Hashmi, Q. Bashir, “Scheduling Based Dynamic Power Management Technique for offline Optimization of Energy in Multi Core Processors” Int. J. Sci. Eng. Res, Vol.9, No.12, pp 6-10, 2018
XIV. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020
XV. Hammad, M., Jillani, R. M., Ullah, S., Namoun, A., Tufail, A., Kim, K. H., & Shah, H, “Security framework for network-based manufacturing systems with personalized customization”, An industry 4.0 approach, Sensors, vol. 23. No. 17-55, 2022
XVI. H. Khan, Q. Bashir, M. U. Hashmi, “Scheduling based energy optimization technique in multiprocessor embedded systems” In 2018 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-8, 2018
XVII. H. Khan, A. Yasmeen, S. Jan, U. Hashmi, “Enhanced Resource Leveling Indynamic Power Management Techniqueof Improvement In Performance For Multi-Core Processors”, Journal Of Mechanics Of Continua And Mathematical Sciences, Vol.6, No.14, pp. 956-972, 2019
XVIII. H. Khan, K. Janjua, A. Sikandar, M. W. Qazi, Z. Hameed, “An Efficient Scheduling based cloud computing technique using virtual Machine Resource Allocation for efficient resource utilization of Servers” In 2020 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, pp 1-7, 2020
XIX. H. Huang, J. Tan And L. Liu, “Countermeasure Techniques For Deceptive Phishing Attack”, International Conference On New Trends In Information And Service Science, Beijing, pp. 636-641, 2009
XX. H. Khan, M. U. Hashmi, Z. Khan, R. Ahmad, “Offline Earliest Deadline first Scheduling based Technique for Optimization of Energy using STORM in Homogeneous Multi-core Systems” IJCSNS Int. J. Comput. Sci. Netw. Secur, Vol.18, No.12, pp 125-130, 2018