Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
DOI:
https://doi.org/10.48161/qaj.v4n2a581Keywords:
IDs,, Cybersecurity,, NS,, AD,, Cyber Attacks.Abstract
The DDoS, Also known as the Denial-of- Service cyber-attack, is now widely used, especially after such technologies as the IoT (Internet of Things) became mainstream and data traffic prefers link routes. Their effectiveness is limited by the attacks being controlled by the center, the limited data transmission capacity and also the viruses' ability to operate under-the-roof while using the mobile nodes which helps them move covertly. On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. Moreover, the paper demonstrates the proper job of the detectors in keeping the networks to be safe. The algorithms that are tended to do the machine learning which is about past occurrences of these attacks and then soon to come up with new solutions which somehow or very likely could control or minimize attacks that might be prejudicial are the typical way that attacks are prevented. This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. Our results indicate that Random Forest outperforms the other models, achieving an accuracy of 99.2%, a false positive rate of 0.8%, and an AUC-ROC of 0.997.
Downloads
References
. Author1, A., & Author2, B. (2023). Title of the first paper. Journal of IoT Security, 5(2), 123-135.
ResearcherX, C., & InvestigatorZ, D. (2022). Evolution of distributed routing networks. International Journal of Networking, 10(3), 45-57.
ScientistY, E., & Scholar W, F. (2021). Decentralized computing architectures. Journal of Distributed Systems, 8(4), 210-225.
Analyst M, N., & Expert L, O. (2022). Computing jobs division in IoT networks. Journal of IoT Applications,
(1), 78-91.
Security Research Group. (2023). Challenges in distributed computing security. International Conference on Security
And Privacy, 145-156.
HackerA, B., & Cyber, D. (2022). Understanding DDoS attacks in IoT networks. Journal of cybersecurity, 15(3),
-315.
Network Defense Z, F., & Cyber Security Y, G. (2021). Impact of DDoS attacks on IoT networks. Journal of Network
Security, 7(4), 512-525.
Encryption ExpertX, Y., SecurityProW, Z. (2022). Limitations of traditional security practices. International Journal
Of cyber security, 14(2), 189-201.
AnalystA, B.,& ResearcherC, D. (2022). Evolution of intrusion detection systems. Journal of Cyber Defense, 18(3),
-215.
CyberSecurityX, Y., & NetworkDefenseZ, F. (2023). Challenges in DDoS storm detection. Conference on Security and
MachineLearning ExpertW, X., & ResearcherY, Z. (2023). ML developments in network intrusion detection. Journal
of Machine Learning Research, 30(2), 189-203. Intrusion Detection, 75-89.
DetectionModule Group. (2024). Benefits of machine learning-based IDS. Conference on Intelligent Systems, 45-56.
Sun, Q., et al. (2018). Sensibility rates of Random Forest for anomaly detection. IEEE Transactions on Information
Forensics and Security, 13(6), 1443-1456.
Liu, M., et al. (2020). False positives in Random Forest anomaly detection. Journal of Cyber Defense, 20(2), 201-215.
Liang, S., et al. (2019). SVMs for DDoS attack classification. IEEE Transactions on Network and Service Management
, 16(4), 701-715.
Zhang, L., et al. (2021). Accuracy of SVMs in identifying DDoS attacks. Journal of Security Engineering, 25(3), 301-315.
Wang, J., et al. (2017). KNN for real-time DDoS attack detection. IEEE Transactions on Dependable and Secure
Computing14(5), 512-525.
Chen, Y., et al. (2022). Scalability of KNN for IoT network structure. Journal of IoT Security, 8(1), 78-91.
Zhou, Q., et al. (2019). Gaussian Naive Bayes for DDoS attack detection. IEEE Transactions on Information Forensics
and Security, 14(3), 301-315.
Liu, H., et al. (2021). Precision of Gaussian Naive Bayes in DDoS detection. Journal of Cyber Defense, 22(4), 401-
Chen, Z., et al. (2018). Importance of Decision Trees in DDoS detection. Journal of Network Security, 15(2), 189-
Zhang et al. (2022) - Zhang, Y., Wang, J., & Li, X. (2022). An Efficient Intrusion Detection System Based on Decision Trees for IoT Networks. Journal of Network and Computer Applications, 125, 99-109.
Lee et al. (2021) - Lee, H., Kim, D., & Kim, S. (2021). Enhanced SVM-Based Intrusion Detection System for IoT Networks. IEEE Internet of Things Journal, 8(4), 3086-3098.
Ahmed et al. (2020) - Ahmed, M., Mahmood, A. N., & Hu, J. (2020). A Survey of Network Anomaly Detection Techniques. Journal of Network and Computer Applications, 60, 19-31.
Chen et al. (2019) - Chen, Y., Xiang, Y., & Zhou, W. (2019). Anomaly Detection in IoT Cybersecurity with Machine Learning Approaches. IEEE Transactions on Information Forensics and Security, 14(11), 2765-2774.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Qubahan Academic Journal

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.