A novel trust-based DDOS cyberattack detection model for smart business environments

Okporokpo, O, Olajide, F, Ajienka, N ORCID logoORCID: https://orcid.org/0000-0002-8792-282X and Ma, X ORCID logoORCID: https://orcid.org/0000-0003-0074-4192, 2025. A novel trust-based DDOS cyberattack detection model for smart business environments. International Journal of Network Security and Its Applications, 17 (5/6), pp. 49-70. ISSN 0975-2307

[thumbnail of 2621619_Ma.pdf]
Preview
Text
2621619_Ma.pdf - Published version

Download (1MB) | Preview

Abstract

As the frequency and complexity of Distributed Denial-of-Service (DDoS) attacks continue to increase, the level of threats posed to Smart Internet of Things (SIoT) business environments have also increased. These environments generally have several interconnected SIoT systems and devices that are integral to daily operations, usually depending on cloud infrastructure and real-time data analytics, which require continuous availability and secure data exchange. Conventional detection mechanisms, while useful in static or traditional network environments, often are inadequate in responding to the needs of these dynamic and diverse SIoT networks. In this paper, we introduce a novel trust-based DDoS detection model tailored to meet the unique requirements of smart business environments. The proposed model incorporates a trust evaluation engine that continuously monitors node behaviour, calculating trust scores based on packet delivery ratio, response time, and anomaly detection. These trust metrics are then aggregated by a central trust-based repository that uses inherent trust values to identify traffic patterns indicative of DDoS attacks. By integrating both trust scores and central trust-based outputs, the trust calculation is enhanced, ensuring that threats are accurately identified and addressed in real-time. The model demonstrated a significant improvement in detection accuracy, and a low false-positive rate with enhanced scalability and adaptability under TCP SYN, Ping Flood, and UDP Flood attacks. The results show that a trust-based approach provides an effective, lightweight alternative for securing resource-constrained business IoT environments.

Item Type: Journal article
Publication Title: International Journal of Network Security and Its Applications
Creators: Okporokpo, O., Olajide, F., Ajienka, N. and Ma, X.
Publisher: Academy and Industry Research Collaboration Center (AIRCC)
Date: November 2025
Volume: 17
Number: 5/6
ISSN: 0975-2307
Identifiers:
Number
Type
10.5121/ijnsa.2025.17604
DOI
2621619
Other
Rights: IJNSA is published under the Creative Commons Attribution (CC BY) license. The journal allows readers to freely read, download, copy, distribute, print, search, or link to the full texts of its articles and to use them for any other lawful purpose.
Divisions: Schools > School of Science and Technology
Record created by: Melissa Cornwell
Date Added: 27 Apr 2026 15:37
Last Modified: 27 Apr 2026 15:37
Related URLs:
URI: https://irep.ntu.ac.uk/id/eprint/55609

Actions (login required)

Edit View Edit View

Statistics

Views

Views per month over past year

Downloads

Downloads per month over past year