Smart City Gnosys

Smart city article details

Title Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling Techniques
ID_Doc 19238
Authors Thiruppathi K.; Jaidhar C.D.
Year 2025
Published Communications in Computer and Information Science, 2333 CCIS
DOI http://dx.doi.org/10.1007/978-3-031-83783-8_6
Abstract In today’s landscape, the burgeoning Internet of Things (IoT) infrastructure underscores the imperative for implementing top-tier security measures to safeguard the IoT realm. This domain has permeated various sectors, including automotive, smart cities, healthcare, industries, and the power sector. The rising ubiquity of IoT devices has drawn the attention of malicious actors, presenting a significant risk of exploitation in insecure, constrained environments. Among the foremost threats in the IoT domain is the Distributed Denial of Service (DDoS) attack, capable of swiftly devastating entire IoT infrastructures. To address this issue, this work proposes a detection and mitigation model aimed at thwarting DDoS attacks in IoT environments. A hybrid feature selection technique is proposed to identify the most effective features for detecting attacks, and Convolutional Neural Network (CNN) is used to identify the suspicious IoT nodes. Further utilized the extended Manufacturer Usage Description (MUD) enabled device profiling techniques to compare the malicious node profiles with existing benign MUD profiles to find the malicious nodes. Linux IPtables is enabled to efficiently filter DDoS attacks. The proposed work is for detecting IoT DDoS attacks, alongside a self-reliant mitigation strategy to effectively filter these attacks. This strategy aims to minimize the impact of blocking legitimate network traffic from IoT devices. The effectiveness of the proposed hybrid feature selection was evaluated by using the CICIoT2023 dataset. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
Author Keywords Deep Learning; Distributed Denial of Service Attack; Internet of Things; Manufacturer Usage Description


Similar Articles


Id Similarity Authors Title Published
33934 View0.92Shukla P.; Krishna C.R.; Patil N.V.Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive ReviewJournal of Supercomputing, 80, 7 (2024)
15037 View0.909Abinaya M.; Prabakeran S.; Kalpana M.Comparative Evaluation On Various Machine Learning Strategies Based On Identification Of Ddos Attacks In Iot Environment2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023 (2023)
295 View0.894Sadhwani S.; Mathur A.; Muthalagu R.; Pawar P.M.5G-Siid: An Intelligent Hybrid Ddos Intrusion Detector For 5G Iot NetworksInternational Journal of Machine Learning and Cybernetics, 16, 2 (2025)
47966 View0.894Un Nisa K.; Alhudhaif A.; Qureshi K.N.; Hadi H.J.; Jeon G.Security Provision For Protecting Intelligent Sensors And Zero Touch Devices By Using Blockchain Method For The Smart CitiesMicroprocessors and Microsystems, 90 (2022)
17574 View0.892Ahmadi K.; Javidan R.Ddos Attack Detection In A Real Urban Iot Environment Using Federated Deep LearningProceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023 (2023)
17576 View0.891Nirosha V.; Hemamalini V.Ddos Attack Detection System For Iot Enabled Smart City Applications With Correlation Analysis2024 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024 (2024)
5530 View0.89Dantas Silva F.S.; Silva E.; Neto E.P.; Lemos M.; Venancio Neto A.J.; Esposito F.A Taxonomy Of Ddos Attack Mitigation Approaches Featured By Sdn Technologies In Iot ScenariosSensors (Switzerland), 20, 11 (2020)
1267 View0.886Lawall M.A.; Shaikh R.A.; Hassan S.R.A Ddos Attack Mitigation Framework For Iot Networks Using Fog ComputingProcedia Computer Science, 182 (2021)
18314 View0.884Abdulla H.; Al-Raweshidy H.S.; Awad W.Denial Of Service Detection For Iot Networks Using Machine LearningInternational Conference on Agents and Artificial Intelligence, 3 (2023)
12424 View0.881Shah Z.; Ullah I.; Li H.; Levula A.; Khurshid K.Blockchain Based Solutions To Mitigate Distributed Denial Of Service (Ddos) Attacks In The Internet Of Things (Iot): A SurveySensors, 22, 3 (2022)