Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment

Brij B. Gupta, Akshat Gaurav, Kwok Tai Chui, Varsha Arya

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In the context of the Internet of Things (IoT), safeguarding against Distributed Denial of Service (DDoS) attacks is critical. This paper introduces an Optimized Edge-cCNN (Convolutional Neural Network) Model designed for robust DDoS detection in IoT environments. The model employs two specialized CNN layers to identify distinct DDoS attack types. To enhance its performance, we utilize the Cuckoo Search algorithm to fine-tune hyperparameters effectively. Our approach demonstrates superior accuracy compared to existing methods while remaining lightweight, making it suitable for resource-constrained edge devices. Through rigorous evaluation, our model exhibits its effectiveness in real-time DDoS threat mitigation. The Optimized Edge-cCNN Model presents an innovative solution for enhancing IoT security, combining deep learning and optimization techniques to combat evolving DDoS attacks effectively.

Original languageEnglish
Title of host publicationEdge Computing – EDGE 2023 - 7th International Conference, Held as Part of the Services Conference Federation, SCF 2023, Proceedings
EditorsJun Feng, Frank Jiang, Min Luo, Liang-Jie Zhang
Pages14-23
Number of pages10
DOIs
Publication statusPublished - 2024
Event7th International Conference on Edge Computing, EDGE 2023 - Shenzhen, China
Duration: 17 Dec 202318 Dec 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14205
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Conference on Edge Computing, EDGE 2023
Country/TerritoryChina
CityShenzhen
Period17/12/2318/12/23

Keywords

  • CNN
  • Cuckoo Search
  • DDoS
  • Edge Computing
  • IoT

Fingerprint

Dive into the research topics of 'Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment'. Together they form a unique fingerprint.

Cite this