Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Dec 28;14(1):30868.
doi: 10.1038/s41598-024-81116-4.

Hybridization of synergistic swarm and differential evolution with graph convolutional network for distributed denial of service detection and mitigation in IoT environment

Affiliations

Hybridization of synergistic swarm and differential evolution with graph convolutional network for distributed denial of service detection and mitigation in IoT environment

Chukka Ramesh Babu et al. Sci Rep. .

Erratum in

Abstract

Enhanced technologies of the future are gradually improving the digital landscape. Internet of Things (IoT) technology is an advanced technique that is quickly increasing owing to the development of a network of organized online devices. In today's digital era, the IoT is considered one of the most robust technologies. However, attackers can effortlessly hack the IoT devices employed to generate botnets, and it is applied to present distributed denial of service (DDoS) attacks beside networks. The DDoS attack is the foremost attack on the system that causes the complete network to go down. Thus, average consumers may need help to get the services they need from the server. The compromised or attackers IoT devices want to be perceived well in the system. So, presently, Deep Learning (DL) plays a prominent part in forecasting end-users' behaviour by extracting features and identifying the adversary in the network. This paper proposes a Synergistic Swarm Optimization and Differential Evolution with Graph Convolutional Network Cyberattack Detection and Mitigation (SSODE-GCNDM) technique in the IoT environment. The main intention of the SSODE-GCNDM method is to recognize the presence of DDoS attack behaviour in IoT platforms. Primarily, the SSODE-GCNDM technique utilizes Z-score normalization to scale the input data into a uniform format. The presented SSODE-GCNDM approach utilizes synergistic swarm optimization with a differential evolution (SSO-DE) approach for the feature selection. Moreover, the graph convolutional network (GCN) method recognizes and mitigates attacks. Finally, the presented SSODE-GCNDM technique implements the northern goshawk optimization (NGO) method to fine-tune the hyperparameters involved in the GCN method. An extensive range of experimentation analyses occur, and the outcomes are observed using numerous features. The experimental validation of the SSODE-GCNDM technique portrayed a superior accuracy value of 99.62% compared to existing approaches.

Keywords: Deep learning; Distributed denial of service; Graph Convolutional Network; Internet of things; Northern Goshawk optimization; Synergistic Swarm optimization.

PubMed Disclaimer

Conflict of interest statement

Declarations. Competing interests: The authors declare no competing interests. Conflict of interest: The authors declare that they have no conflict of interest. The manuscript was written with the contributions of all authors, and all authors have approved the final version. Ethics approval: This article contains no studies with human participants performed by any authors. Consent to participate: Not applicable. Informed consent: Not applicable.

Figures

Fig. 1
Fig. 1
General structure of DDoS attack in IoT.
Fig. 2
Fig. 2
Overall process of SSODE-GCNDM technique.
Fig. 3
Fig. 3
Structure of the SSO-DE model.
Fig. 4
Fig. 4
Structure of GCN.
Fig. 5
Fig. 5
Architecture of the NGO approach.
Fig. 6
Fig. 6
Confusion matrices of SSODE-GCNDM technique (a-f) Epochs 500–3000.
Fig. 7
Fig. 7
Average outcome of SSODE-GCNDM technique (a) Epochs 500, (b) Epochs 1000, (c) Epochs 1500, (d) Epochs 2000, (e) Epochs 2500, (f) Epochs 3000.
Fig. 8
Fig. 8
formula image curve of SSODE-GCNDM technique on Epoch 1000.
Fig. 9
Fig. 9
Loss curve of SSODE-GCNDM technique on Epoch 1000.
Fig. 10
Fig. 10
PR curve of SSODE-GCNDM technique on Epoch 1000.
Fig. 11
Fig. 11
ROC curve of SSODE-GCNDM technique on Epoch 1000.
Fig. 12
Fig. 12
Comparative analysis of SSODE-GCNDM approach with recent models.
Fig. 13
Fig. 13
CT outcome of SSODE-GCNDM technique with recent models.

Similar articles

References

    1. Karmous, N., Aoueileyine, M. O. E., Abdelkader, M., Romdhani, L. & Youssef, N. Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices. Sensors, 24(15), p.5022. (2024). - PMC - PubMed
    1. Ramprasath, J., Krishnaraj, N. & Seethalakshmi, V. Mitigation services on SDN for distributed denial of service and denial of service attacks using machine learning techniques. IETE J. Res.70 (1), 70–81 (2024).
    1. Arachchige, K. G., Branch, P. & But, J. An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks. Sensors, 24(10), p.3083. (2024). - PMC - PubMed
    1. Kumar, G. & Pragya IPv6 addressing with hidden duplicate address detection to mitigate denial of service attacks in the internet of drone. Concurrency and Computation: Practice and Experience, p.e8131. (2024).
    1. Hnamte, V., Najar, A. A., Nhung-Nguyen, H., Hussain, J. & Sugali, M. N. DDoS attack detection and mitigation using deep neural network in SDN environment. Computers & Security, 138, p.103661. (2024).

LinkOut - more resources