Smart City Gnosys

Smart city article details

Title Distributed Denial Of Service Attack Detection And Mitigation Strategy In 5G-Enabled Internet Of Things Networks With Adaptive Cascaded Gated Recurrent Unit
ID_Doc 20623
Authors Akhtar M.M.; Alasmari S.A.; Haidar S.W.; Alzubaidi A.A.
Year 2025
Published Peer-to-Peer Networking and Applications, 18, 2
DOI http://dx.doi.org/10.1007/s12083-024-01894-6
Abstract In real-time manner, the deployment of 5G network is an essential role in Internet of Things (IoT) by facilitating with massive Machine-Type Communications (mMTC). This advancement in IoT technology becomes crucial for enabling a wide variety of applications like intelligent manufacturing, smart energy grids, and development of smart cities. The most commonly known attacks in IoT are Distributed Denial of Service (DDoS) that causes huge traffic flow into the large number of devices and misleading transmission of data packets. However, the defensive measures in existing approaches are largely ineffective. Among various cyber threats, the defense against DDoS attacks is particularly challenging due to their dynamic nature. Also, the accurate detection of DDoS is a quite challenging in the traditional methods of 5G-based IoT networks. In order to resolve these issues, the research work implements an effective model using optimal routing to safeguard the 5G-based IoT networks. The advancement of these model helps to mitigate the DDoS attack that offer effective data transmission. Initially, the input data is accumulated from IoT network. Further, the DDoS attack detection is performed via the developed Adaptive Cascaded Gated Recurrent Unit (ACGRU), in which the parameters are optimally tuned using Exploration or Exploitation-based Pine Cone Optimization (EEPCO) algorithm. The detected node is further mitigated for an effective and secured data transfer. In order to achieve that, the optimal routing is done by using EEPCO. To attain better optimal routing, the objective functions are formulated with constraints like trust, energy and throughput. Throughout the experimental analysis, the diverse positive measures like accuracy, specificity, sensitivity, and precision are validated to show the effective outcome as 94.05, 94.69, 93.39 and 93.68 while detecting the attacks. On considering statistical analysis, the performance of the developed EEPCO algorithm attains 5.4%, 7.3%, 33.8% and 11.5% enhanced than DSO, EVO, GFROA and PCOA in terms of median. Therefore, the security of the IoT network is improved by optimal routing and helpful for transmitting the data without any delay. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
Author Keywords Adaptive cascaded gated recurrent unit; Attack detection and mitigation; Distributed denial of service; Exploration or exploitation-based pine cone optimization; Optimal routing; Throughput


Similar Articles


Id Similarity Authors Title Published
295 View0.902Sadhwani S.; Mathur A.; Muthalagu R.; Pawar P.M.5G-Siid: An Intelligent Hybrid Ddos Intrusion Detector For 5G Iot NetworksInternational Journal of Machine Learning and Cybernetics, 16, 2 (2025)
1267 View0.899Lawall M.A.; Shaikh R.A.; Hassan S.R.A Ddos Attack Mitigation Framework For Iot Networks Using Fog ComputingProcedia Computer Science, 182 (2021)
33934 View0.889Shukla P.; Krishna C.R.; Patil N.V.Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive ReviewJournal of Supercomputing, 80, 7 (2024)
5530 View0.877Dantas Silva F.S.; Silva E.; Neto E.P.; Lemos M.; Venancio Neto A.J.; Esposito F.A Taxonomy Of Ddos Attack Mitigation Approaches Featured By Sdn Technologies In Iot ScenariosSensors (Switzerland), 20, 11 (2020)
17581 View0.875Rajan D.M.; Sathya Priya S.Ddos Mitigation Techniques In Iot: A Survey2022 International Conference on IoT and Blockchain Technology, ICIBT 2022 (2022)
15037 View0.865Abinaya M.; Prabakeran S.; Kalpana M.Comparative Evaluation On Various Machine Learning Strategies Based On Identification Of Ddos Attacks In Iot Environment2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023 (2023)
19238 View0.861Thiruppathi K.; Jaidhar C.D.Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling TechniquesCommunications in Computer and Information Science, 2333 CCIS (2025)
20627 View0.861Benlloch-Caballero P.; Wang Q.; Alcaraz Calero J.M.Distributed Dual-Layer Autonomous Closed Loops For Self-Protection Of 5G/6G Iot Networks From Distributed Denial Of Service AttacksComputer Networks, 222 (2023)
37141 View0.861Brasilino L.R.B.; Swany M.Mitigating Ddos Flooding Attacks Against Iot Using Custom Hardware Modules2019 6th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019 (2019)
57546 View0.86Benlloch-Caballero P.; Sanchez-Navarro I.; Matencio-Escolar A.; Calero J.M.A.; Wang Q.Topology-Aware Cognitive Self-Protection Framework For Automated Detection And Mitigation Of Security And Privacy Incidents In 5G-Iot NetworksProceedings - International Conference on Network Protocols, ICNP (2023)