Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Enhancing DDoS Attacks Mitigation Using Machine Learning and Blockchain-Based Mobile Edge Computing in IoT
Publication

Enhancing DDoS Attacks Mitigation Using Machine Learning and Blockchain-Based Mobile Edge Computing in IoT

Title
Enhancing DDoS Attacks Mitigation Using Machine Learning and Blockchain-Based Mobile Edge Computing in IoT
Type
Article in International Scientific Journal
Year
2025
Authors
Chaira, M
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Belhenniche, A
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Chertovskih, R
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Journal
The Journal is awaiting validation by the Administrative Services.
Title: COMPUTATIONImported from Authenticus Search for Journal Publications
Vol. 13
Final page: 158
ISSN: 2079-3197
Indexing
Publicação em ISI Web of Knowledge ISI Web of Knowledge - 0 Citations
Publicação em Scopus Scopus - 0 Citations
Other information
Authenticus ID: P-019-MBR
Abstract (EN): The widespread adoption of Internet of Things (IoT) devices has been accompanied by a remarkable rise in both the frequency and intensity of Distributed Denial of Service (DDoS) attacks, which aim to overwhelm and disrupt the availability of networked systems and connected infrastructures. In this paper, we present a novel approach to DDoS attack detection and mitigation that integrates state-of-the-art machine learning techniques with Blockchain-based Mobile Edge Computing (MEC) in IoT environments. Our solution leverages the decentralized and tamper-resistant nature of Blockchain technology to enable secure and efficient data collection and processing at the network edge. We evaluate multiple machine learning models, including K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), Transformer architectures, and LightGBM, using the CICDDoS2019 dataset. Our results demonstrate that Transformer models achieve a superior detection accuracy of 99.78%, while RF follows closely with 99.62%, and LightGBM offers optimal efficiency for real-time detection. This integrated approach significantly enhances detection accuracy and mitigation effectiveness compared to existing methods, providing a robust and adaptive mechanism for identifying and mitigating malicious traffic patterns in IoT environments.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 17
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Unimodal and Multimodal Perception for Forest Management: Review and Dataset (2021)
Another Publication in an International Scientific Journal
da Silva, DQ; Filipe Neves Santos; Armando Jorge Sousa; Filipe, V; Boaventura Cunha, J
Optimal Control of a Passive Particle Advected by a Lamb-Oseen (Viscous) Vortex (2022)
Article in International Scientific Journal
Marques, G; Sílvio Gama; Pereira, FL
Exploring Controlled Passive Particle Motion Driven by Point Vortices on a Sphere (2024)
Article in International Scientific Journal
Balsa, C; Otero-Espinar, MV; Sílvio Gama
Recommend this page Top
Copyright 1996-2025 © Centro de Desporto da Universidade do Porto I Terms and Conditions I Acessibility I Index A-Z
Page created on: 2025-10-21 23:09:17 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book