Ajou University repository

DDoS Intrusions Detection in Low Power SD-IoT Devices Leveraging Effective Machine Learning
  • Ali, Jehad ;
  • Song, Houbing Herbert ;
  • Sharma, Vandana ;
  • Al-Khasawneh, Mahmoud Ahmad
Citations

SCOPUS

1

Citation Export

DC Field Value Language
dc.contributor.authorAli, Jehad-
dc.contributor.authorSong, Houbing Herbert-
dc.contributor.authorSharma, Vandana-
dc.contributor.authorAl-Khasawneh, Mahmoud Ahmad-
dc.date.issued2024-01-01-
dc.identifier.issn1558-4127-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/34516-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85206344971&origin=inward-
dc.description.abstractSecurity and privacy are significant concerns in software-defined networking (SDN)-applied Internet of Things (IoT) environments, due to the proliferation of connected devices and the potential for cyberattacks. Hence, robust security mechanisms need to be developed, including authentication, encryption, and distributed denial of service (DDoS) attack detection, tailored to the constraints of low-power IoT devices. Selecting a suitable tiny machine learning (TinyML) algorithm for low-power IoT devices for DDoS attack detection involves considering various factors such as computational complexity, robustness in dealing with heterogeneous data, accuracy, and the specific constraints of the target IoT device. In this paper, we present a two-fold approach for the optimal TinyML algorithm selection leveraging the hybrid analytical network process (HANP). First, we make a comparative analysis (qualitative) of the machine learning algorithm in the context of suitability for TinyML in the domain of SD-IoT devices and generate the weights of suitability for TinyML applications in SD-IoT. Then we evaluate the performance of the machine learning algorithms and validate the results of the model to demonstrate the effectiveness of the proposed method. Finally, we see the effect of dimensionality reduction with respect to features and how it affects the precision, recall, accuracy, and F1 score. The results demonstrate the effectiveness of the scheme.-
dc.description.sponsorshipThis work was supported partially by the BK21 FOUR program of the National Research Foundation of Korea funded by the Ministry of Education (NRF5199991514504)-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshAttack detection-
dc.subject.meshDecisions makings-
dc.subject.meshDenialof- service attacks-
dc.subject.meshDistributed denial of service-
dc.subject.meshDistributed denial of service attack-
dc.subject.meshLow Power-
dc.subject.meshLow power internet of thing-
dc.subject.meshMachine learning algorithms-
dc.subject.meshMachine-learning-
dc.subject.meshSoftware-defined networkings-
dc.titleDDoS Intrusions Detection in Low Power SD-IoT Devices Leveraging Effective Machine Learning-
dc.typeArticle-
dc.citation.titleIEEE Transactions on Consumer Electronics-
dc.identifier.bibliographicCitationIEEE Transactions on Consumer Electronics-
dc.identifier.doi10.1109/tce.2024.3472707-
dc.identifier.scopusid2-s2.0-85206344971-
dc.identifier.urlhttps://ieeexplore.ieee.org/servlet/opac?punumber=30-
dc.subject.keywordDDoS attacks-
dc.subject.keywordDecision making-
dc.subject.keywordLow power IoT-
dc.subject.keywordMachine learning-
dc.subject.keywordSDN-
dc.type.otherArticle-
dc.identifier.pissn0098-3063-
dc.description.isoafalse-
dc.subject.subareaMedia Technology-
dc.subject.subareaElectrical and Electronic Engineering-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.