A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
The Internet of Things (IoT) is a developing technology and its range of applications is satisfying among numerous consumers, as it makes everything very simple. As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. To...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10804803/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832583234250080256 |
---|---|
author | Manal Alkhammash |
author_facet | Manal Alkhammash |
author_sort | Manal Alkhammash |
collection | DOAJ |
description | The Internet of Things (IoT) is a developing technology and its range of applications is satisfying among numerous consumers, as it makes everything very simple. As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. To overcome this problem, mitigation and intrusion detection are achieved which improves the safety of IoT networks. Recently, the technology of blockchain (BC) has developed as a strength for IoT-based application growth. The BC is mainly operated to resolve single-point failure (third-part dependence), security, and privacy problems of IoT applications. The combination of BC using IoT is an advantage for both society and individuals. However, a Distributed Denial of Service (DDoS) attack on extracting pool discovered the crucial mistake line between BC-permitted networks of IoT. Besides, this use makes vast data quantities. Machine Learning (ML) provides broad sovereignty in the study of big data, and abilities of decision making and so it is employed as a critical device. Therefore, this study develops a Metaheuristic Approach to Detecting and Mitigating Attacks in the Blockchain-Integrated Deep Learning (MHADMA-BCIDL) model. The designed MHADMA-BCIDL approach’s main goal is to classify and detect DDoS attacks and accomplish security in the IoT Application. To obtain this, the MHADMA-BCIDL method utilizes BC technologies to facilitate secured communication in networks of IoT, reinforcing security through decentralized and immutable data storage. For the feature selection process, the arctic tern optimization (ATO) technique is employed to decrease the data dimensionality while conserving the most relevant attributes. Besides, the MHADMA-BCIDL technique employs an attention-based convolutional neural network with bi-directional long short-term memory (CNN-BiLSTM-Attention) method for the detection and classification of attacks. For parameter tuning, the walrus optimizer (WO) model is used to fine-tune the hyperparameters of the CNN-BiLSTM-attention method. The investigational outcome study of the MHADMA-BCIDL technique is verified under BoT-IoT dataset. The experimental validation of the MHADMA-BCIDL technique portrayed a superior accuracy value of 99.32% over existing technique. |
format | Article |
id | doaj-art-7a01ef1030674206b717c0dbf47ea930 |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-7a01ef1030674206b717c0dbf47ea9302025-01-29T00:00:45ZengIEEEIEEE Access2169-35362024-01-011219318419319410.1109/ACCESS.2024.351913210804803A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT ApplicationsManal Alkhammash0https://orcid.org/0000-0001-6438-1314Department of Computer Science, College of Engineering and Computer Sciences, Jazan University, Jazan, Saudi ArabiaThe Internet of Things (IoT) is a developing technology and its range of applications is satisfying among numerous consumers, as it makes everything very simple. As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. To overcome this problem, mitigation and intrusion detection are achieved which improves the safety of IoT networks. Recently, the technology of blockchain (BC) has developed as a strength for IoT-based application growth. The BC is mainly operated to resolve single-point failure (third-part dependence), security, and privacy problems of IoT applications. The combination of BC using IoT is an advantage for both society and individuals. However, a Distributed Denial of Service (DDoS) attack on extracting pool discovered the crucial mistake line between BC-permitted networks of IoT. Besides, this use makes vast data quantities. Machine Learning (ML) provides broad sovereignty in the study of big data, and abilities of decision making and so it is employed as a critical device. Therefore, this study develops a Metaheuristic Approach to Detecting and Mitigating Attacks in the Blockchain-Integrated Deep Learning (MHADMA-BCIDL) model. The designed MHADMA-BCIDL approach’s main goal is to classify and detect DDoS attacks and accomplish security in the IoT Application. To obtain this, the MHADMA-BCIDL method utilizes BC technologies to facilitate secured communication in networks of IoT, reinforcing security through decentralized and immutable data storage. For the feature selection process, the arctic tern optimization (ATO) technique is employed to decrease the data dimensionality while conserving the most relevant attributes. Besides, the MHADMA-BCIDL technique employs an attention-based convolutional neural network with bi-directional long short-term memory (CNN-BiLSTM-Attention) method for the detection and classification of attacks. For parameter tuning, the walrus optimizer (WO) model is used to fine-tune the hyperparameters of the CNN-BiLSTM-attention method. The investigational outcome study of the MHADMA-BCIDL technique is verified under BoT-IoT dataset. The experimental validation of the MHADMA-BCIDL technique portrayed a superior accuracy value of 99.32% over existing technique.https://ieeexplore.ieee.org/document/10804803/BlockchainDDoS attackwalrus optimizermetaheuristicdeep learningfeature selection |
spellingShingle | Manal Alkhammash A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications IEEE Access Blockchain DDoS attack walrus optimizer metaheuristic deep learning feature selection |
title | A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications |
title_full | A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications |
title_fullStr | A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications |
title_full_unstemmed | A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications |
title_short | A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications |
title_sort | metaheuristic approach to detecting and mitigating ddos attacks in blockchain integrated deep learning models for iot applications |
topic | Blockchain DDoS attack walrus optimizer metaheuristic deep learning feature selection |
url | https://ieeexplore.ieee.org/document/10804803/ |
work_keys_str_mv | AT manalalkhammash ametaheuristicapproachtodetectingandmitigatingddosattacksinblockchainintegrateddeeplearningmodelsforiotapplications AT manalalkhammash metaheuristicapproachtodetectingandmitigatingddosattacksinblockchainintegrateddeeplearningmodelsforiotapplications |