Simulation model of a scalable method for detecting multi-vector attacks taking into account the limitations of computing and information resources of IoT devices
https://doi.org/10.32362/2500-316X-2025-13-5-25-40
EDN: JKQMQM
Abstract
Objectives. The study sets out to develop a scalable method for detecting multi-vector attacks on Internet of Things (IoT) devices. Given the growth of security threats in IoT networks, such a solution must provide high accuracy in detecting attacks with minimal computing costs while taking into account the resource constraints of IoT devices.
Methods. The developed hybrid neural network architecture combines convolutional networks for spatial dependence analysis and long short-term memory networks or gated recurrent units representing types of recurrent neural networks for analyzing time dependencies in network traffic. Model parameters and computational costs are reduced by pruning. A blockchain with a proof of voting3 consensus mechanism provides secure data management and decentralized verification.
Results. Experiments on the CIC IoT Dataset 20234 showed the effectiveness of the model: the accuracy and F1 measure were 99.1%. This confirms the ability to detect known and new attacks in real time with high accuracy and completeness. Processing time is reduced to 12 ms, while memory usage is reduced to 180 MB, which makes the model suitable for devices with limited resources.
Conclusions. The developed model is superior to analogues in terms of accuracy, processing time, and memory usage. Hybrid architecture, pruning, and decentralized verification provide effectiveness against multi-vector IoT threats.
About the Authors
V. I. PetrenkoRussian Federation
Vyacheslav I. Petrenko, Сand. Sci. (Eng.), Associate Professor, Head of the Department of Organization and Technology of Information Security, Prof. Nikolay Chervyakov Faculty of Mathematics and Computer Sciences
1, Pushkina ul., Stavropol, 355017
Scopus Author ID 57189512011
ResearcherID A-3196-2017
Competing Interests:
The authors declare no conflicts of interest
F. B. Tebueva
Russian Federation
Fariza B. Tebueva, Dr. Sci. (Phys.-Math.), Associate Professor, Professor, Department of Computational Mathematics and Cybernetics, Prof. Nikolay Chervyakov Faculty of Mathematics and Computer Sciences
1, Pushkina ul., Stavropol, 355017
Scopus Author ID 57189512319
ResearcherID H-4548-2017
Competing Interests:
The authors declare no conflicts of interest
M. G. Ogur
Russian Federation
Maxim G. Ogur, Senior Lecturer, Department of Computational Mathematics and Cybernetics, Prof. Nikolay Chervyakov Faculty of Mathematics and Computer Sciences,
1, Pushkina ul., Stavropol, 355017
ResearcherID B-1332-2017
Competing Interests:
The authors declare no conflicts of interest
G. I. Linets
Russian Federation
Gennady I. Linets, Dr. Sci. (Eng.), Professor, Department of Digital, Robotic Systems and Electronics, Institute of Advanced Engineering
1, Pushkina ul., Stavropol, 355017
Scopus Author ID 6506372022
Competing Interests:
The authors declare no conflicts of interest
V. P. Mochalov
Russian Federation
Valery P. Mochalov, Dr. Sci. (Eng.), Professor, Department of Digital, Robotic Systems and Electronics, Institute of Advanced Engineering
1, Pushkina ul., Stavropol, 355017
Scopus Author ID 57202300745
Competing Interests:
The authors declare no conflicts of interest
References
1. Sen Ö., Ivanov B., Henze M., Ulbig A. Investigation of Multi-stage Attacks and Defense Modeling for Data Synthesis. In: Proceedings of the International Conference on Smart Energy Systems and Technologies (SEST). IEEE; 2023. P. 1–12. https://doi.org/10.1109/SEST57387.2023.10257329
2. Lysenko S., Bobrovnikova K., Kharchenko V., Savenko O. IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency. Algorithms. 2022;15(7):239. https://doi.org/10.3390/a15070239
3. Aguru A., Erukala S. OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks. ACM Trans. Internet Technol. 2024;24(3):15.1–15.31. https://doi.org/10.1145/3664287
4. Ipole-Adelaiye N., Tatama F.B., Egena O., Jenom M., Ibrahim L. Detecting Multi-Vector Attack Threats Using Multilayer Perceptron Network. IRE Journals. 2024;8(1):119–123.
5. Pakmehr A., Aßmuth A., Taheri N., Ghaffari A. DDoS attack detection techniques in IoT networks: a survey. Cluster Comput. 2024;27(4):14637–14668. https://doi.org/10.1007/s10586-024-04662-6
6. Alhakami W. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS. PLoS One. 2024;19(5):e0302559. https://doi.org/10.1371/journal.pone.0302559
7. Saiyed M.F., Al-Anbagi I. Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks. IEEE Trans. Machine Learning Commun. Networks. 2024;2:596–616. https://doi.org/10.1109/TMLCN.2024.3395419
8. Liebl S. Threat Modelling for Internet of Things Devices. Research Report 2023 of the Technical University OTH Amberg-Weiden. 2023. URL: https://www.researchgate.net/publication/369488078. Дата обращения 25.02.2025. / Accessed February 25, 2025.
9. Aguru A.D., Erukala S.B. A lightweight multi-vector DDoS detection framework for IoT-enabled mobile health informatics systems using deep learning. Inf. Sci. 2024;662:120209. https://doi.org/10.1016/j.ins.2024.120209
10. Petrenko V.I., Tebueva F.B., Ogur M.G., Linets G.I., Mochalov V.P. Methodology for detecting and countering multi-vector threats to information security of a decentralized IoT system. Int. J. Open Inf. Technol. 2025;13(1):13–24 (in Russ.).
11. Leng S., Guo Y., Zhang L., Hao F., Cao X., Li F., Kou W. Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing. In: ICC 2024 – International Conference on Communications. 2024. P. 1394–1399. https://doi.org/10.1109/ICC51166.2024.10623052
12. Ali M., Saleem Y., Hina S., Shah G.A. DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer. Internet of Things. 2025;30:101527. https://doi.org/10.1016/j.iot.2025.101527
13. Dalal S., Lilhore U.K., Faujdar N., Simaiya S., et al. Next-generation cyberattack prediction for IoT systems: leveraging multiclass SVM and optimized CHAID decision tree. J. Cloud Comput. 2023;12:137. https://doi.org/10.1186/s13677-023-00517-4
14. Zahid F., Funchal G., Melo V., Kuo M.M.Y., et al. DDoS attacks on smart manufacturing systems: A cross-domain taxonomy and attack vectors. In: 2022 20th IEEE International Conference on Industrial Informatics (INDIN). 2022. P. 214–219. https://doi.org/10.1109/INDIN51773.2022.9976172
15. Lungu N., Dash B.B., De U.C., Dash B.B., et al. Multi-vector Monitoring, Detecting and Classifying GPU Side-Channel Attack Vectors on a Secure GPU Execution Framework. In: 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). 2024. P. 500–505. https://doi.org/10.1109/I-SMAC61858.2024.10714895
Review
For citations:
Petrenko V.I., Tebueva F.B., Ogur M.G., Linets G.I., Mochalov V.P. Simulation model of a scalable method for detecting multi-vector attacks taking into account the limitations of computing and information resources of IoT devices. Russian Technological Journal. 2025;13(5):25-40. https://doi.org/10.32362/2500-316X-2025-13-5-25-40. EDN: JKQMQM