Voting Model Strategies for Reliable Categorical IoT-DDoS Attack Prediction

Authors

  • Shivani Sinha Research Scholar, Department of Computer Engineering, Sigma Institute of Engineering, Gujarat, India Author
  • Dr. Sheshang Degadwala Professor & Head of Department, Department of Computer Engineering, Sigma University, Gujarat, India Author

DOI:

https://doi.org/10.32628/CSEIT2410223

Keywords:

IoT-DDoS, Ensemble Voting Strategies, Categorical Data Analysis, Machine Learning Algorithms, Feature Engineering

Abstract

This research focuses on developing reliable categorical IoT-DDoS attack prediction models using ensemble voting strategies. The study explores various machine learning algorithms suitable for categorical data analysis, employing feature engineering techniques to preprocess IoT data. Ensemble learning methodologies, including bagging, boosting, and stacking, are then utilized to build robust prediction models. Evaluation metrics such as precision, recall, F1-score, and AUC-ROC are used to assess model performance, demonstrating the effectiveness of ensemble voting models in reliably predicting IoT-DDoS attacks. Comparative analyses with individual classifiers highlight the advantages of ensemble approaches in terms of predictive accuracy and robustness against data imbalances and noise. This work contributes to advancing IoT security by providing a practical framework for deploying predictive models that aid in early detection and mitigation of DDoS attacks, enhancing overall resilience against cyber threats in IoT ecosystems.

Downloads

Download data is not yet available.

References

J. Bhayo, S. A. Shah, S. Hameed, A. Ahmed, J. Nasir, and D. Draheim, “Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks,” Engineering Applications of Artificial Intelligence, vol. 123, no. July 2022, p. 106432, 2023, doi: 10.1016/j.engappai.2023.106432. DOI: https://doi.org/10.1016/j.engappai.2023.106432

F. S. de Lima Filho, F. A. F. Silveira, A. de Medeiros Brito Junior, G. Vargas-Solar, and L. F. Silveira, “Smart detection: An online approach for DoS/DDoS attack detection using machine learning,” Secur. Commun. Netw., vol. 2019, pp. 1–15, 2019. DOI: https://doi.org/10.1155/2019/1574749

S. U. Jan, S. Ahmed, V. Shakhov, and I. Koo, “Toward a lightweight intrusion detection system for the internet of things,” IEEE Access, vol. 7, pp. 42450–42471, undefined 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2907965

Y. Otoum and A. Nayak, “AS-IDS: Anomaly and signature-based IDS for the internet of things,” J. Netw. Syst. Manag., vol. 29, no. 3, 2021. DOI: https://doi.org/10.1007/s10922-021-09589-6

R. Zagrouba and R. AlHajri, “Machine Learning based attacks detection and countermeasures in IoT,” International j. commun. netw. inf. secur., vol. 13, no. 2, 2021. DOI: https://doi.org/10.17762/ijcnis.v13i2.4943

B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,” Internet of things, vol. 11, no. 100227, p. 100227, 2020. DOI: https://doi.org/10.1016/j.iot.2020.100227

S. Pokhrel, R. Abbas, and B. Aryal, “IoT Security: Botnet detection in IoT using Machine learning,” arXiv [cs.LG], 2021.

E. Anthi, L. Williams, M. Slowinska, G. Theodorakopoulos, and P. Burnap, “A supervised intrusion detection system for smart home IoT devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 9042–9053, 2019. DOI: https://doi.org/10.1109/JIOT.2019.2926365

M. Essaid, D. Kim, S. H. Maeng, S. Park, and H. T. Ju, “A collaborative DDoS mitigation solution based on ethereum smart contract and RNN-LSTM,” in 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2019, pp. 1–6. DOI: https://doi.org/10.23919/APNOMS.2019.8892947

U. Javaid, A. K. Siang, M. N. Aman, and B. Sikdar, “Mitigating loT Device based DDoS Attacks using Blockchain,” in Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018. DOI: https://doi.org/10.1145/3211933.3211946

R. Singh, S. Tanwar, and T. P. Sharma, “Utilization of blockchain for mitigating the distributed denial of service attacks,” Secur. Priv., vol. 3, no. 3, 2020. DOI: https://doi.org/10.1002/spy2.96

K. Bhardwaj, J. C. Miranda, and A. Gavrilovska, “Towards IoT-DDoS prevention using edge computing,” Usenix.org. [Online]. Available: https://www.usenix.org/system/files/conference/hotedge18/hotedge18-papers-bhardwaj.pdf.

P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing,” Trans. emerg. telecommun. technol., vol. 32, no. 6, 2021. DOI: https://doi.org/10.1002/ett.4112

N.-N. Dao et al., “Securing heterogeneous IoT with intelligent DDoS attack behavior learning,” IEEE Syst. J., pp. 1–10, undefined 2021.

V. Adat and B. B. Gupta, “A DDoS attack mitigation framework for internet of things,” in 2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 2036–2041. DOI: https://doi.org/10.1109/ICCSP.2017.8286761

Downloads

Published

28-03-2024

Issue

Section

Research Articles

How to Cite

[1]
S. S. Sinha and D. S. D. Degadwala, “Voting Model Strategies for Reliable Categorical IoT-DDoS Attack Prediction”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 10, no. 2, pp. 300–307, Mar. 2024, doi: 10.32628/CSEIT2410223.

Most read articles by the same author(s)

Similar Articles

1-10 of 378

You may also start an advanced similarity search for this article.