Author
Listed:
- FATMA S. ALRAYES
(Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P. O. Box 84428, Riyadh 11671, Saudi Arabia)
- MOHAMMED ALJEBREEN
(��Department of Computer Science, Community College, King Saud University, P. O. Box 28095, Riyadh 11437, Saudi Arabia)
- MOHAMMED ALGHAMDI
(��Department of Information Systems, College of Computer Science, King Khalid University, Abha, Saudi Arabia)
- FAHEED A. F. ALRSLANI
(�Department of Information Technology, Faculty of Computing and Information Technology, Northern Border University, Rafha, Saudi Arabia)
- ASMA ALSHUHAIL
(�Department of Information Systems, College of Computer Sciences & Information Technology, King Faisal University, Saudi Arabia)
- WAFA SULAIMAN ALMUKADI
(��Department of Software Engineering, College of Engineering and Computer Science, University of Jeddah, Saudi Arabia)
- IMAN BASHETI
(*Jadara University, Irbid, Jordan††The University of Sydney, NSW, Australia)
- MAHIR MOHAMMED SHARIF
(��‡Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia)
Abstract
Consumer electronics (CE) and the Internet of Things (IoTs) are transforming daily routines by integrating smart technology into household gadgets. IoT allows devices to link and communicate from the Internet with better functions, remote control, and automation of various complex systems simulation platforms. The quick progress in IoT technology has continuously driven the progress of further connected and intelligent CEs, shaping more smart cities and homes. Blockchain (BC) technology is emerging as a promising technology offering immutable distributed ledgers that improve the security and integrity of data. However, even with BC resilience, the IoT ecosystem remains vulnerable to Distributed Denial of Service (DDoS) attacks. In contrast, the malicious actor overwhelms the network with traffic, disrupting services and compromising device functionality. Incorporating BC with IoT infrastructure presents groundbreaking techniques to alleviate these threats. IoT networks can better detect and respond to DDoS attacks in real time by leveraging BC cryptographic techniques and decentralized consensus mechanisms, which safeguard against disruptions and enhance resilience. There must be a reliable mechanism of recognition based on adequate techniques to detect and identify whether these attacks have happened or not in the system. Artificial intelligence (A) is the most common technique that uses machine learning (ML) and deep learning (DL) to recognize cyber threats. This research presents a new Blockchain with Ensemble Deep Learning-based Distributed DoS Attack Detection (BCEDL-DDoSD) approach in the IoT platform. The primary intention of the BCEDL-DDoSD approach is to leverage BC with a DL-based attack recognition process in the IoT platform. BC technology is utilized to enable a secure data transmission process. In the BCEDL-DDoSD approach, Z-score normalization is initially employed to measure the input data. Besides, the selection of features takes place using the Fractal Wombat optimization algorithm (WOA). For attack recognition, the BCDL-DDoSD technique applies an ensemble of three models, namely denoising autoencoder (DAE), gated recurrent unit (GRU), and long short-term memory (LSTM). Lastly, an orca predator algorithm (OPA)-based hyperparameter tuning procedure has been implemented to select the parameter value of DL models. A sequence of simulations is made on the benchmark database to authorize the performance of the BCDL-DDoSD approach. The simulation results showed that the BCDL-DDoSD approach performs better than other DL techniques.
Suggested Citation
Fatma S. Alrayes & Mohammed Aljebreen & Mohammed Alghamdi & Faheed A. F. Alrslani & Asma Alshuhail & Wafa Sulaiman Almukadi & Iman Basheti & Mahir Mohammed Sharif, 2024.
"Harnessing Blockchain With Ensemble Deep Learning-Based Distributed Dos Attack Detection In Iot-Assisted Secure Consumer Electronics Systems,"
FRACTALS (fractals), World Scientific Publishing Co. Pte. Ltd., vol. 32(09n10), pages 1-16.
Handle:
RePEc:wsi:fracta:v:32:y:2024:i:09n10:n:s0218348x25400444
DOI: 10.1142/S0218348X25400444
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:fracta:v:32:y:2024:i:09n10:n:s0218348x25400444. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: https://www.worldscientific.com/worldscinet/fractals .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.