Preview

Russian Technological Journal

Advanced search

Simulation model of a scalable method for detecting multi-vector attacks taking into account the limitations of computing and information resources of IoT devices

https://doi.org/10.32362/2500-316X-2025-13-5-25-40

EDN: JKQMQM

Abstract

Objectives. The study sets out to develop a scalable method for detecting multi-vector attacks on Internet of Things (IoT) devices. Given the growth of security threats in IoT networks, such a solution must provide high accuracy in detecting attacks with minimal computing costs while taking into account the resource constraints of IoT devices.
Methods. The developed hybrid neural network architecture combines convolutional networks for spatial dependence analysis and long short-term memory networks or gated recurrent units representing types of recurrent neural networks for analyzing time dependencies in network traffic. Model parameters and computational costs are reduced by pruning. A blockchain with a proof of voting3 consensus mechanism provides secure data management and decentralized verification.
Results. Experiments on the CIC IoT Dataset 20234 showed the effectiveness of the model: the accuracy and F1 measure were 99.1%. This confirms the ability to detect known and new attacks in real time with high accuracy and completeness. Processing time is reduced to 12 ms, while memory usage is reduced to 180 MB, which makes the model suitable for devices with limited resources.
Conclusions. The developed model is superior to analogues in terms of accuracy, processing time, and memory usage. Hybrid architecture, pruning, and decentralized verification provide effectiveness against multi-vector IoT threats.

About the Authors

V. I. Petrenko
North Caucasus Federal University
Russian Federation

Vyacheslav I. Petrenko, Сand. Sci. (Eng.), Associate Professor, Head of the Department of Organization and Technology of Information Security, Prof. Nikolay Chervyakov Faculty of Mathematics and Computer Sciences

1, Pushkina ul., Stavropol, 355017

Scopus Author ID 57189512011

ResearcherID A-3196-2017


Competing Interests:

The authors declare no conflicts of interest



F. B. Tebueva
North Caucasus Federal University
Russian Federation

Fariza B. Tebueva, Dr. Sci. (Phys.-Math.), Associate Professor, Professor, Department of Computational Mathematics and Cybernetics, Prof. Nikolay Chervyakov Faculty of Mathematics and Computer Sciences

1, Pushkina ul., Stavropol, 355017

Scopus Author ID 57189512319

ResearcherID H-4548-2017


Competing Interests:

The authors declare no conflicts of interest



M. G. Ogur
North Caucasus Federal University
Russian Federation

Maxim G. Ogur, Senior Lecturer, Department of Computational Mathematics and Cybernetics, Prof. Nikolay Chervyakov Faculty of Mathematics and Computer Sciences,

1, Pushkina ul., Stavropol, 355017

ResearcherID B-1332-2017


Competing Interests:

The authors declare no conflicts of interest



G. I. Linets
North Caucasus Federal University
Russian Federation

Gennady I. Linets, Dr. Sci. (Eng.), Professor, Department of Digital, Robotic Systems and Electronics, Institute of Advanced Engineering

1, Pushkina ul., Stavropol, 355017

Scopus Author ID 6506372022


Competing Interests:

The authors declare no conflicts of interest



V. P. Mochalov
North-Caucasus Federal University
Russian Federation

Valery P. Mochalov, Dr. Sci. (Eng.), Professor, Department of Digital, Robotic Systems and Electronics, Institute of Advanced Engineering

1, Pushkina ul., Stavropol, 355017

Scopus Author ID 57202300745


Competing Interests:

The authors declare no conflicts of interest



References

1. Sen Ö., Ivanov B., Henze M., Ulbig A. Investigation of Multi-stage Attacks and Defense Modeling for Data Synthesis. In: Proceedings of the International Conference on Smart Energy Systems and Technologies (SEST). IEEE; 2023. P. 1–12. https://doi.org/10.1109/SEST57387.2023.10257329

2. Lysenko S., Bobrovnikova K., Kharchenko V., Savenko O. IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency. Algorithms. 2022;15(7):239. https://doi.org/10.3390/a15070239

3. Aguru A., Erukala S. OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks. ACM Trans. Internet Technol. 2024;24(3):15.1–15.31. https://doi.org/10.1145/3664287

4. Ipole-Adelaiye N., Tatama F.B., Egena O., Jenom M., Ibrahim L. Detecting Multi-Vector Attack Threats Using Multilayer Perceptron Network. IRE Journals. 2024;8(1):119–123.

5. Pakmehr A., Aßmuth A., Taheri N., Ghaffari A. DDoS attack detection techniques in IoT networks: a survey. Cluster Comput. 2024;27(4):14637–14668. https://doi.org/10.1007/s10586-024-04662-6

6. Alhakami W. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS. PLoS One. 2024;19(5):e0302559. https://doi.org/10.1371/journal.pone.0302559

7. Saiyed M.F., Al-Anbagi I. Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks. IEEE Trans. Machine Learning Commun. Networks. 2024;2:596–616. https://doi.org/10.1109/TMLCN.2024.3395419

8. Liebl S. Threat Modelling for Internet of Things Devices. Research Report 2023 of the Technical University OTH Amberg-Weiden. 2023. URL: https://www.researchgate.net/publication/369488078. Дата обращения 25.02.2025. / Accessed February 25, 2025.

9. Aguru A.D., Erukala S.B. A lightweight multi-vector DDoS detection framework for IoT-enabled mobile health informatics systems using deep learning. Inf. Sci. 2024;662:120209. https://doi.org/10.1016/j.ins.2024.120209

10. Petrenko V.I., Tebueva F.B., Ogur M.G., Linets G.I., Mochalov V.P. Methodology for detecting and countering multi-vector threats to information security of a decentralized IoT system. Int. J. Open Inf. Technol. 2025;13(1):13–24 (in Russ.).

11. Leng S., Guo Y., Zhang L., Hao F., Cao X., Li F., Kou W. Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing. In: ICC 2024 – International Conference on Communications. 2024. P. 1394–1399. https://doi.org/10.1109/ICC51166.2024.10623052

12. Ali M., Saleem Y., Hina S., Shah G.A. DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer. Internet of Things. 2025;30:101527. https://doi.org/10.1016/j.iot.2025.101527

13. Dalal S., Lilhore U.K., Faujdar N., Simaiya S., et al. Next-generation cyberattack prediction for IoT systems: leveraging multiclass SVM and optimized CHAID decision tree. J. Cloud Comput. 2023;12:137. https://doi.org/10.1186/s13677-023-00517-4

14. Zahid F., Funchal G., Melo V., Kuo M.M.Y., et al. DDoS attacks on smart manufacturing systems: A cross-domain taxonomy and attack vectors. In: 2022 20th IEEE International Conference on Industrial Informatics (INDIN). 2022. P. 214–219. https://doi.org/10.1109/INDIN51773.2022.9976172

15. Lungu N., Dash B.B., De U.C., Dash B.B., et al. Multi-vector Monitoring, Detecting and Classifying GPU Side-Channel Attack Vectors on a Secure GPU Execution Framework. In: 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). 2024. P. 500–505. https://doi.org/10.1109/I-SMAC61858.2024.10714895


Review

For citations:


Petrenko V.I., Tebueva F.B., Ogur M.G., Linets G.I., Mochalov V.P. Simulation model of a scalable method for detecting multi-vector attacks taking into account the limitations of computing and information resources of IoT devices. Russian Technological Journal. 2025;13(5):25-40. https://doi.org/10.32362/2500-316X-2025-13-5-25-40. EDN: JKQMQM

Views: 20


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2782-3210 (Print)
ISSN 2500-316X (Online)