Enhancing Cybersecurity with Trust-Based Machine Learning: A Defense against DDoS and Packet Suppression Attacks

Adnan AHMED, Muhammad AWAIS, Mohammad SIRAJ, Muhammad UMAR
{"title":"Enhancing Cybersecurity with Trust-Based Machine Learning: A Defense against DDoS and Packet Suppression Attacks","authors":"Adnan AHMED, Muhammad AWAIS, Mohammad SIRAJ, Muhammad UMAR","doi":"10.55549/epstem.1368266","DOIUrl":null,"url":null,"abstract":"As technology becomes more intertwined with our daily lives, it is increasingly important to protect our data from attackers. Cyber security has become a top priority for individuals, businesses, and governments, as the threat of cybercrime is constantly evolving and becoming more sophisticated. With the rapid increase in cyberattacks, it has become tricky and cumbersome for cybersecurity experts to react to them all, predict new attacks and analyze the impact of damage being done to business. Traditional security measures such as firewalls, anti-virus software, and intrusion detections are no longer adequate in protecting against new vulnerabilities, especially insider and misbehavior attacks. Recently, Artificial Intelligence based techniques have brought tremendous improvements in cybersecurity with the integration of machine learning (ML) algorithms. ML methods have been built upon large volumes of real-time network data to deploy automated security and threat detection systems. Nonetheless, various cyber-attacks still circumvent traditional security mechanisms deployed to detect those attacks. To address the challenge, in this paper, we propose a machine learning-enabled trust-based routing protocol (TrustML-RP) that identifies the attacking nodes responsible for Distributed Denial of Service (DDoS) and packet suppression attacks. The proposed TrustML-RP scheme first adopts a distributed trust model for establishing trust factor among the participating nodes and later employs an effective combination of ML algorithms e.g., Artificial Neural Network (ANN) and Support Vector Machine (SVM) to find an optimal and secure route and identify attacker nodes. A comprehensive performance evaluation of the proposed scheme is carried out to demonstrate the efficiency on a reasonably sized network containing mixed nodes. The results demonstrate the effectiveness of the proposed scheme in building a trusted network environment and improving network security. The research findings suggest that the integration of a trust-based model and ML techniques can improve traditional cybersecurity methods thereby enabling cybersecurity professionals to design more effective cybersecurity systems.","PeriodicalId":22384,"journal":{"name":"The Eurasia Proceedings of Science Technology Engineering and Mathematics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Eurasia Proceedings of Science Technology Engineering and Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55549/epstem.1368266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As technology becomes more intertwined with our daily lives, it is increasingly important to protect our data from attackers. Cyber security has become a top priority for individuals, businesses, and governments, as the threat of cybercrime is constantly evolving and becoming more sophisticated. With the rapid increase in cyberattacks, it has become tricky and cumbersome for cybersecurity experts to react to them all, predict new attacks and analyze the impact of damage being done to business. Traditional security measures such as firewalls, anti-virus software, and intrusion detections are no longer adequate in protecting against new vulnerabilities, especially insider and misbehavior attacks. Recently, Artificial Intelligence based techniques have brought tremendous improvements in cybersecurity with the integration of machine learning (ML) algorithms. ML methods have been built upon large volumes of real-time network data to deploy automated security and threat detection systems. Nonetheless, various cyber-attacks still circumvent traditional security mechanisms deployed to detect those attacks. To address the challenge, in this paper, we propose a machine learning-enabled trust-based routing protocol (TrustML-RP) that identifies the attacking nodes responsible for Distributed Denial of Service (DDoS) and packet suppression attacks. The proposed TrustML-RP scheme first adopts a distributed trust model for establishing trust factor among the participating nodes and later employs an effective combination of ML algorithms e.g., Artificial Neural Network (ANN) and Support Vector Machine (SVM) to find an optimal and secure route and identify attacker nodes. A comprehensive performance evaluation of the proposed scheme is carried out to demonstrate the efficiency on a reasonably sized network containing mixed nodes. The results demonstrate the effectiveness of the proposed scheme in building a trusted network environment and improving network security. The research findings suggest that the integration of a trust-based model and ML techniques can improve traditional cybersecurity methods thereby enabling cybersecurity professionals to design more effective cybersecurity systems.
基于信任的机器学习增强网络安全:防御DDoS和包抑制攻击
随着技术与我们的日常生活越来越紧密地交织在一起,保护我们的数据免受攻击变得越来越重要。随着网络犯罪的威胁不断演变和变得越来越复杂,网络安全已成为个人、企业和政府的首要任务。随着网络攻击的迅速增加,网络安全专家对所有攻击做出反应、预测新的攻击并分析对企业造成的损害的影响已经变得棘手和繁琐。传统的安全措施,如防火墙、防病毒软件和入侵检测,不再足以防止新的漏洞,特别是内部和不当行为的攻击。最近,基于人工智能的技术与机器学习(ML)算法的集成给网络安全带来了巨大的改善。机器学习方法已经建立在大量实时网络数据的基础上,以部署自动化安全和威胁检测系统。尽管如此,各种网络攻击仍然绕过了用于检测这些攻击的传统安全机制。为了应对这一挑战,在本文中,我们提出了一种支持机器学习的基于信任的路由协议(TrustML-RP),该协议可以识别负责分布式拒绝服务(DDoS)和数据包抑制攻击的攻击节点。本文提出的TrustML-RP方案首先采用分布式信任模型在参与节点之间建立信任因子,然后将人工神经网络(ANN)和支持向量机(SVM)等ML算法有效结合,寻找最优安全的路由,识别攻击节点。对该方案进行了综合性能评估,以证明该方案在包含混合节点的合理规模网络上的效率。实验结果证明了该方案在构建可信网络环境和提高网络安全性方面的有效性。研究结果表明,基于信任的模型和机器学习技术的集成可以改进传统的网络安全方法,从而使网络安全专业人员能够设计更有效的网络安全系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
0.20
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信