Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks

Author:

Kumar Parmod1,Baliyan Anupam2,Prasad K. Ramalingeswara3,Sreekanth N.4,Jawarkar Parag5,Roy Vandana6ORCID,Amoatey Enoch Tetteh7ORCID

Affiliation:

1. Department of Electronics and Information Engineering, Jiangxi University of Engineering, Xinyu, Jiangxi, China

2. Chitkara University Institute of Engineering & Technology, Chitkara University, Punjab, India

3. Department of EEE, Lakireddy Bali Reddy College of Engineering (A), Mylavaram, India

4. Professor & HoD, Department of ECE, Malla Reddy Engineering College for Women, Maisammaguda Dhulapally Post Via Kompally, Secunderabad, Telangana, India

5. Department of Electronics Engineering, Shri Ramdeobaba College of Engineering and Management, Nagpur, India

6. Professor, Electronics & Communication Engineering, Gyan Ganga Institute of Technology & Sciences, Jabalpur-482001, M.P., India

7. School of Engineering, University for Development Studies, Ghana

Abstract

A number of disadvantages of traditional networks may be attributed to the close relationship that exists between the control plane and the data plane inside proprietary hardware designs, as described above. The problem of security is one of the most difficult to deal with. There are a plethora of network hazards and attacks that might be encountered these days. DDoS attacks are one of the most popular and disruptive attacks on the internet today, and they affect a wide range of organisations. Despite a large number of traditional mitigation solutions now available, the frequency, volume, and intensity of distributed denial-of-service (DDoS) attacks continue to rise. According to the findings of this paper, a new network paradigm is necessary to satisfy the requirements of today’s complex security concerns. It was necessary to develop a software-defined network (SDN) in order to meet the real-time needs of the massive network that was expanding at an exponential rate. Many advantages of SDN exist, including simplicity of administration, scalability, and agility, but one of the most critical is security, which is one of the most important considerations when implementing SDN. SDS may be seen as a paradigm in which the implementation of new security regulations in the computer environment is performed via the use of protected software, which is described further below. The goal is to provide a flexible and extensible architecture for DDoS detection and prevention that is both flexible and extendable; the suggested clustering approach, which is based on the Open Day Light (ODL) Controller, is employed to carry out the experimental findings. In this section, we emphasise DDoS penetration techniques from a range of tools, and we evaluate the vulnerability against various tactics. It is necessary to use a Mininet emulation tool to construct a detection and prevention system against distributed denial of service (DDoS) attacks in order to achieve success. There is a range of other simulation tools that are utilised in conjunction with this research in order to bring it to a conclusion. Integration of industry standards such as SNORT and Flow has been accomplished in a variety of situations and parameter settings. During the creation of a framework capable of detecting and mitigating DDoS attacks at an early stage in both the control and application levels, the implementation of this framework has been shown to be crucial in the development of a framework.

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Cited by 65 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Deep Learning-Infused Hybrid Security Model for Energy Optimization and Enhanced Security in Wireless Sensor Networks;SN Computer Science;2024-09-02

2. An Energy Efficient IPv6 Packet Delivery Outline for Industrial IoT Over G.9959 Protocol Based Wireless Sensor Network (WSN);SN Computer Science;2024-08-23

3. Exploring the Potential of Machine Learning in Enhancing Agricultural Practices and Food Production;2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT);2024-04-06

4. Enhancing Robotic Automation In Industries Using Industrial Informatics;2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT);2024-04-06

5. Exploring The Role of Edge Computing In Optimizing Broadcast Technologies;2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT);2024-04-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3