A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments
By: Oghenetejiri Okporokpo , Funminiyi Olajide , Nemitari Ajienka and more
Potential Business Impact:
Protects smart businesses from internet attacks.
As the frequency and complexity of Distributed Denial-of-Service (DDoS) attacks continue to increase, the level of threats posed to Smart Internet of Things (SIoT) business environments have also increased. These environments generally have several interconnected SIoT systems and devices that are integral to daily operations, usually depending on cloud infrastructure and real-time data analytics, which require continuous availability and secure data exchange. Conventional detection mechanisms, while useful in static or traditional network environments, often are inadequate in responding to the needs of these dynamic and diverse SIoT networks. In this paper, we introduce a novel trust-based DDoS detection model tailored to meet the unique requirements of smart business environments. The proposed model incorporates a trust evaluation engine that continuously monitors node behaviour, calculating trust scores based on packet delivery ratio, response time, and anomaly detection. These trust metrics are then aggregated by a central trust-based repository that uses inherent trust values to identify traffic patterns indicative of DDoS attacks. By integrating both trust scores and central trust-based outputs, the trust calculation is enhanced, ensuring that threats are accurately identified and addressed in real-time. The model demonstrated a significant improvement in detection accuracy, and a low false-positive rate with enhanced scalability and adaptability under TCP SYN, Ping Flood, and UDP Flood attacks. The results show that a trust-based approach provides an effective, lightweight alternative for securing resource-constrained business IoT environments.
Similar Papers
A Transformer-Based Approach for DDoS Attack Detection in IoT Networks
Cryptography and Security
Finds internet attacks on smart gadgets.
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems
Cryptography and Security
**Finds bad guys attacking your smart gadgets.**
Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security
Cryptography and Security
Protects smart devices from hackers.