Okporokpo, O, Olajide, F, Ajienka, N ORCID: https://orcid.org/0000-0002-8792-282X and Ma, X
ORCID: https://orcid.org/0000-0003-0074-4192,
2025.
A novel trust-based DDOS cyberattack detection model for smart business environments.
International Journal of Network Security and Its Applications, 17 (5/6), pp. 49-70.
ISSN 0975-2307
Preview |
Text
2621619_Ma.pdf - Published version Download (1MB) | Preview |
Abstract
As the frequency and complexity of Distributed Denial-of-Service (DDoS) attacks continue to increase, the level of threats posed to Smart Internet of Things (SIoT) business environments have also increased. These environments generally have several interconnected SIoT systems and devices that are integral to daily operations, usually depending on cloud infrastructure and real-time data analytics, which require continuous availability and secure data exchange. Conventional detection mechanisms, while useful in static or traditional network environments, often are inadequate in responding to the needs of these dynamic and diverse SIoT networks. In this paper, we introduce a novel trust-based DDoS detection model tailored to meet the unique requirements of smart business environments. The proposed model incorporates a trust evaluation engine that continuously monitors node behaviour, calculating trust scores based on packet delivery ratio, response time, and anomaly detection. These trust metrics are then aggregated by a central trust-based repository that uses inherent trust values to identify traffic patterns indicative of DDoS attacks. By integrating both trust scores and central trust-based outputs, the trust calculation is enhanced, ensuring that threats are accurately identified and addressed in real-time. The model demonstrated a significant improvement in detection accuracy, and a low false-positive rate with enhanced scalability and adaptability under TCP SYN, Ping Flood, and UDP Flood attacks. The results show that a trust-based approach provides an effective, lightweight alternative for securing resource-constrained business IoT environments.
| Item Type: | Journal article |
|---|---|
| Publication Title: | International Journal of Network Security and Its Applications |
| Creators: | Okporokpo, O., Olajide, F., Ajienka, N. and Ma, X. |
| Publisher: | Academy and Industry Research Collaboration Center (AIRCC) |
| Date: | November 2025 |
| Volume: | 17 |
| Number: | 5/6 |
| ISSN: | 0975-2307 |
| Identifiers: | Number Type 10.5121/ijnsa.2025.17604 DOI 2621619 Other |
| Rights: | IJNSA is published under the Creative Commons Attribution (CC BY) license. The journal allows readers to freely read, download, copy, distribute, print, search, or link to the full texts of its articles and to use them for any other lawful purpose. |
| Divisions: | Schools > School of Science and Technology |
| Record created by: | Melissa Cornwell |
| Date Added: | 27 Apr 2026 15:37 |
| Last Modified: | 27 Apr 2026 15:37 |
| Related URLs: | |
| URI: | https://irep.ntu.ac.uk/id/eprint/55609 |
Actions (login required)
![]() |
Edit View |
Statistics
Views
Views per month over past year
Downloads
Downloads per month over past year

Tools
Tools





