ارسل ملاحظاتك

ارسل ملاحظاتك لنا









Securing IoT Devices in Wireless Networks for Detection and Mitigation of MiTM and DDoS Attacks

المصدر: المجلة العربية للنشر العلمي
الناشر: مركز البحث وتطوير الموارد البشرية - رماح
المؤلف الرئيسي: Al-Salouli, Sara (Author)
المجلد/العدد: ع76
محكمة: نعم
الدولة: الأردن
التاريخ الميلادي: 2025
الشهر: شباط
الصفحات: 385 - 424
ISSN: 2663-5798
رقم MD: 1547933
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: EduSearch, HumanIndex
مواضيع:
كلمات المؤلف المفتاحية:
IOT | SDN | Mininet-WiFi | DDOS | MiTM | Machine Learning
رابط المحتوى:
صورة الغلاف QR قانون

عدد مرات التحميل

5

حفظ في:
المستخلص: This research aims to solve the security challenges faced by Internet of Things (IoT) devices in software defined networking (SDN) environments, with a particular focus on mitigating man-in-the-middle and distributed denial-of-service (DDoS) attacks. The proposed approach for DDOS involves generating a dataset from a data stream in the network, which is then trained and tested using machine learning algorithms such as KNN, SVM, RF, DT, and NB. The goal is to identify the algorithm that has the highest accuracy resulting from Training and testing of the target data, which is found to be Random Forest (RF), which we will use for forecasting and data analysis purposes, and Random Forest (RF) will be used in the proposed model to detect and mitigate Distributed Denial of Service (DDoS) attacks. Also to enhance security To protect against ARP spoofing attacks, lookup provides ARP with a mechanism to detect this type of attack. The mechanism includes the following steps: extracting packet information, learning MAC-to-Port assignments, and checking if the packet is an ARP request. If it is an ARP request, it will be stored Set IP-MAC. If mitigation is enabled and the packet is an ARP packet, the system will check for ARP spoofing. If ARP spoofing is detected, a stream entry is added to the switch the attacker attended. Otherwise, the packet is forwarded. If Mitigation is not enabled, the packet is simply forwarded. Search includes a stream entry management component that removes expired stream entries. If the specified flow entry expires, it is removed from the system to maintain efficiency and ensure security measures are up to date. By implementing this proposed model, IoT devices in SDN networks can be protected against DDoS attacks and ARP spoofing, thus enhancing the overall network security and reliability.

ISSN: 2663-5798

عناصر مشابهة