Conference Paper
BibTex RIS Cite
Year 2023, Volume: 23, 262 - 268, 30.09.2023
https://doi.org/10.55549/epstem.1368266

Abstract

References

  • Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). TERP: A trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.
  • Awais Rajput, M., Umar, M., Ahmed, A., Raza Bhangwar, A., Suhail Memon, K., & Misbah, A. (2022). Evaluation of machine learning based network attack detection. Sukkur IBA Journal of Emerging Technologies, 5(2), 58–66.
  • Cheema, A., Tariq, M., Hafiz, A., Khan, M. M., Ahmad, F., & Anwar, M. (2022). Prevention techniques against distributed denial of service attacks in heterogeneous networks: A systematic review. Hindawi Security and Communication Networks.

Enhancing Cybersecurity with Trust-Based Machine Learning: A Defense against DDoS and Packet Suppression Attacks

Year 2023, Volume: 23, 262 - 268, 30.09.2023
https://doi.org/10.55549/epstem.1368266

Abstract

As technology becomes more intertwined with our daily lives, it is increasingly important to protect our data from attackers. Cyber security has become a top priority for individuals, businesses, and governments, as the threat of cybercrime is constantly evolving and becoming more sophisticated. With the rapid increase in cyberattacks, it has become tricky and cumbersome for cybersecurity experts to react to them all, predict new attacks and analyze the impact of damage being done to business. Traditional security measures such as firewalls, anti-virus software, and intrusion detections are no longer adequate in protecting against new vulnerabilities, especially insider and misbehavior attacks. Recently, Artificial Intelligence based techniques have brought tremendous improvements in cybersecurity with the integration of machine learning (ML) algorithms. ML methods have been built upon large volumes of real-time network data to deploy automated security and threat detection systems. Nonetheless, various cyber-attacks still circumvent traditional security mechanisms deployed to detect those attacks. To address the challenge, in this paper, we propose a machine learning-enabled trust-based routing protocol (TrustML-RP) that identifies the attacking nodes responsible for Distributed Denial of Service (DDoS) and packet suppression attacks. The proposed TrustML-RP scheme first adopts a distributed trust model for establishing trust factor among the participating nodes and later employs an effective combination of ML algorithms e.g., Artificial Neural Network (ANN) and Support Vector Machine (SVM) to find an optimal and secure route and identify attacker nodes. A comprehensive performance evaluation of the proposed scheme is carried out to demonstrate the efficiency on a reasonably sized network containing mixed nodes. The results demonstrate the effectiveness of the proposed scheme in building a trusted network environment and improving network security. The research findings suggest that the integration of a trust-based model and ML techniques can improve traditional cybersecurity methods thereby enabling cybersecurity professionals to design more effective cybersecurity systems.

References

  • Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). TERP: A trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.
  • Awais Rajput, M., Umar, M., Ahmed, A., Raza Bhangwar, A., Suhail Memon, K., & Misbah, A. (2022). Evaluation of machine learning based network attack detection. Sukkur IBA Journal of Emerging Technologies, 5(2), 58–66.
  • Cheema, A., Tariq, M., Hafiz, A., Khan, M. M., Ahmad, F., & Anwar, M. (2022). Prevention techniques against distributed denial of service attacks in heterogeneous networks: A systematic review. Hindawi Security and Communication Networks.
There are 3 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Articles
Authors

Adnan Ahmed

Muhammad Awaıs

Mohammad Sıraj

Muhammad Umar

Early Pub Date September 29, 2023
Publication Date September 30, 2023
Published in Issue Year 2023Volume: 23

Cite

APA Ahmed, A., Awaıs, M., Sıraj, M., Umar, M. (2023). Enhancing Cybersecurity with Trust-Based Machine Learning: A Defense against DDoS and Packet Suppression Attacks. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 23, 262-268. https://doi.org/10.55549/epstem.1368266