Javascript must be enabled to continue!
Modeling Distributed Denial‐of‐Service Attacks to Develop Defensive Strategies in the Internet of Everything
View through CrossRef
ABSTRACT
As smart devices become increasingly interconnected through the Internet, the Internet of Everything (IoE) has emerged as a foundational aspect of modern life, supporting convenience, automation, and energy management. However, many IoE devices lack sufficient security mechanisms, making them vulnerable targets for cyberattacks, particularly Distributed Denial‐of‐Service (DDoS) attacks. This research proposes a mathematical modeling framework to analyze and simulate the behavior of DDoS attacks in IoE environments. A modified SIR (Susceptible‐Infected‐Recovered) model is employed to represent device state transitions, combined with assumptions about traffic volume and device capacity, as well as theoretical theorems for developing effective defense strategies. Simulation results reveal that when the basic reproduction number exceeds 1, the system experiences rapid propagation of the attack, with the number of compromised devices increasing significantly before recovering through isolation mechanisms. Three defense strategies were compared: no defense, static defense with , and adaptive defense that adjusts dynamically based on the infection level. The results show that without defense, the system is overwhelmed and fails. Static defense fully mitigates the attack but consumes a constant level of resources. In contrast, adaptive defense effectively reduces system impact using significantly fewer resources by scaling mitigation based on real‐time threats. Visualizations such as phase diagrams, heatmaps, and cumulative cost graphs confirm the theoretical findings and illustrate the dynamics clearly. This study concludes that mathematical modeling, combined with dynamic control strategies, can significantly improve the resilience of IoE systems against DDoS attacks. The validated approach offers a practical foundation for designing scalable and adaptive cybersecurity solutions for future IoT and IoE infrastructures.
Title: Modeling Distributed Denial‐of‐Service Attacks to Develop Defensive Strategies in the Internet of Everything
Description:
ABSTRACT
As smart devices become increasingly interconnected through the Internet, the Internet of Everything (IoE) has emerged as a foundational aspect of modern life, supporting convenience, automation, and energy management.
However, many IoE devices lack sufficient security mechanisms, making them vulnerable targets for cyberattacks, particularly Distributed Denial‐of‐Service (DDoS) attacks.
This research proposes a mathematical modeling framework to analyze and simulate the behavior of DDoS attacks in IoE environments.
A modified SIR (Susceptible‐Infected‐Recovered) model is employed to represent device state transitions, combined with assumptions about traffic volume and device capacity, as well as theoretical theorems for developing effective defense strategies.
Simulation results reveal that when the basic reproduction number exceeds 1, the system experiences rapid propagation of the attack, with the number of compromised devices increasing significantly before recovering through isolation mechanisms.
Three defense strategies were compared: no defense, static defense with , and adaptive defense that adjusts dynamically based on the infection level.
The results show that without defense, the system is overwhelmed and fails.
Static defense fully mitigates the attack but consumes a constant level of resources.
In contrast, adaptive defense effectively reduces system impact using significantly fewer resources by scaling mitigation based on real‐time threats.
Visualizations such as phase diagrams, heatmaps, and cumulative cost graphs confirm the theoretical findings and illustrate the dynamics clearly.
This study concludes that mathematical modeling, combined with dynamic control strategies, can significantly improve the resilience of IoE systems against DDoS attacks.
The validated approach offers a practical foundation for designing scalable and adaptive cybersecurity solutions for future IoT and IoE infrastructures.
Related Results
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Denial-of-service (DoS) attacks on website systems have
become increasingly sophisticated. These attacks are evolving
at a pace and complexity that outstrips the capabilities of
cu...
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
Denial of service attacks have become one of the most difficult network security problems because they are easy to implement, difficult to prevent, and difficult to track, and they...
Patient safety assurance in the age of defensive medicine: a review
Patient safety assurance in the age of defensive medicine: a review
AbstractThe definition of defensive medicine has evolved over time given various permutations and combinations. The underlying meaning, however, has persisted in its relevance towa...
Influence of organisational defensive patterns on learning ICT
Influence of organisational defensive patterns on learning ICT
PurposeThe purpose of this paper is to investigate whether the IT professionals in a Hong Kong public transport company have a general perception of influence of the organisational...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...

