Journal of Machine and Computing


Federated Learning Enabled Fog Computing Framework for DDoS Mitigation in SDN Based IoT Networks



Journal of Machine and Computing

Received On : 12 October 2024

Revised On : 26 March 2025

Accepted On : 25 May 2025

Published On : 05 July 2025

Volume 05, Issue 03

Pages : 1492-1502


Abstract


DDoS attacks require efficient detection due to challenges like latency, false positives, and resource inefficiency, especially in IoT and Fog-SDN setups. A framework combining ML and DL for real-time DDoS detection was evaluated against Logistic Regression, Random Forest, and CNN using benchmark datasets. Key metrics included accuracy, precision, recall, F1-score, false positive rate, latency, and resource use. The framework achieved 98.3% accuracy, surpassing CNN (95.6%), Random Forest (91.5%), and Logistic Regression (86.8%). Precision, recall, and F1-score were 98.7%, 97.8%, and 98.2%. False positive rates were 2.1%, compared to CNN (4.3%), Random Forest (6.4%), and Logistic Regression (8.2%). Latency was 30–110 ms for 100–500 requests in Fog-SDN versus 50–180 ms in cloud setups. Resource utilization was efficient: fog nodes 70%, cloud 60%, and IoT devices 40%. The proposed framework ensures high accuracy, low latency, and efficient resource use, perfect for real-time DDoS detection in Fog-SDN environments.


Keywords


SDN, Fog Computing, Federated Learning, Machine Learning, DDoS Mitigation, IoT, Distributed Controllers.


  1. A. Rahdari et al., “Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions,” Computers, Materials & Continua, vol. 80, no. 2, pp. 2511–2533, 2024, doi: 10.32604/cmc.2024.052994.
  2. S. Durairaj and R. Sridhar, “Coherent virtual machine provisioning based on balanced optimization using entropy-based conjectured scheduling in cloud environment,” Engineering Applications of Artificial Intelligence, vol. 132, p. 108423, Jun. 2024, doi: 10.1016/j.engappai.2024.108423.
  3. F. Wahab, A. Shah, I. Khan, B. Ali, and M. Adnan, “An SDN-based Hybrid-DL-driven cognitive intrusion detection system for IoT ecosystem,” Computers and Electrical Engineering, vol. 119, p. 109545, Oct. 2024, doi: 10.1016/j.compeleceng.2024.109545.
  4. R. Krishnan and S. Durairaj, “Reliability and performance of resource efficiency in dynamic optimization scheduling using multi-agent microservice cloud-fog on IoT applications,” Computing, vol. 106, no. 12, pp. 3837–3878, Jun. 2024, doi: 10.1007/s00607-024-01301-1.
  5. A. A. Toony, F. Alqahtani, Y. Alginahi, and W. Said, “MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure,” Internet of Things, vol. 26, p. 101231, Jul. 2024, doi: 10.1016/j.iot.2024.101231.
  6. S. S. Mahadik, P. M. Pawar, and R. Muthalagu, “Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues,” Multimedia Tools and Applications, vol. 83, no. 12, pp. 35371–35412, Sep. 2023, doi: 10.1007/s11042-023-16715-w.
  7. X. Wu, Z. Jin, J. Zhou, K. Liu, and Z. Liu, “Against network attacks in renewable power plants: Malicious behavior defense for federated learning,” Computer Networks, vol. 250, p. 110577, Aug. 2024, doi: 10.1016/j.comnet.2024.110577.
  8. S. Durairaj and R. Sridhar, “Task scheduling to a virtual machine using a multi‐objective mayfly approach for a cloud environment,” Concurrency and Computation: Practice and Experience, vol. 34, no. 24, Jul. 2022, doi: 10.1002/cpe.7236.
  9. D. Khosnawi, S. Askar, Z. Soran, and H. Saeed, “Fog Computing in Next Generation Networks: A Review,” Indonesian Journal of Computer Science, vol. 13, no. 2, Apr. 2024, doi: 10.33022/ijcs.v13i2.3851.
  10. J. Ahmad et al., “Machine learning and blockchain technologies for cybersecurity in connected vehicles,” WIREs Data Mining and Knowledge Discovery, vol. 14, no. 1, Sep. 2023, doi: 10.1002/widm.1515.
  11. M. Seydali, F. Khunjush, and J. Dogani, "Streaming traffic classification: a hybrid deep learning and big data approach," Cluster Computing, pp. 1-29, 2024.
  12. B. Isong, O. Kgote, and A. Abu-Mahfouz, “Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems,” Electronics, vol. 13, no. 12, p. 2370, Jun. 2024, doi: 10.3390/electronics13122370.
  13. Z. Chen, M. Simsek, B. Kantarci, M. Bagheri, and P. Djukic, “Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier,” Computer Networks, vol. 250, p. 110576, Aug. 2024, doi: 10.1016/j.comnet.2024.110576.
  14. A. Rahman et al., “Machine learning and deep learning-based approach in smart healthcare: Recent advances, applications, challenges and opportunities,” AIMS Public Health, vol. 11, no. 1, pp. 58–109, 2024, doi: 10.3934/publichealth.2024004.
  15. P. Krishnan, K. Jain, S. R. Poojara, S. N. Srirama, T. Pandey, and R. Buyya, “eSIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks,” Computer Communications, vol. 216, pp. 324–345, Feb. 2024, doi: 10.1016/j.comcom.2023.12.023.
  16. N. K. S. Nayak and B. Bhattacharyya, “An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology,” Future Internet, vol. 16, no. 10, p. 359, Oct. 2024, doi: 10.3390/fi16100359.
  17. S. Alsubai, M. Umer, N. Innab, S. Shiaeles, and M. Nappi, “Multi-scale convolutional auto encoder for anomaly detection in 6G environment,” Computers & Industrial Engineering, vol. 194, p. 110396, Aug. 2024, doi: 10.1016/j.cie.2024.110396.
  18. C. Kumar and Md. S. A. Ansari, “An explainable nature-inspired cyber attack detection system in Software-Defined IoT applications,” Expert Systems with Applications, vol. 250, p. 123853, Sep. 2024, doi: 10.1016/j.eswa.2024.123853.
  19. T. Ghodsizad, "Internet of Medical Things with Considering of Artificial Intelligence," International Journal of Sustainable Applied Science and Engineering, vol. 1, no. 1, pp. 75-102, 2024.
  20. V. Tomer, S. Sharma, and M. Davis, “Resilience in the Internet of Medical Things: A Review and Case Study,” Future Internet, vol. 16, no. 11, p. 430, Nov. 2024, doi: 10.3390/fi16110430.
  21. D. Javeed, T. Gao, P. Kumar, and A. Jolfaei, “An Explainable and Resilient Intrusion Detection System for Industry 5.0,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 1342–1350, Feb. 2024, doi: 10.1109/tce.2023.3283704.
  22. M. T. Masud, M. Keshk, N. Moustafa, I. Linkov, and D. K. Emge, “Explainable Artificial Intelligence for Resilient Security Applications in the Internetof Things,” IEEE Open Journal of the Communications Society, vol. 6, pp. 2877–2906, 2025, doi: 10.1109/ojcoms.2024.3413790.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Kumar J and Arul Leena Rose P J; Methodology: Kumar J; Visualization: Kumar J; Investigation: Kumar J and Arul Leena Rose P J; Supervision: Arul Leena Rose P J; Validation: Kumar J; Writing- Reviewing and Editing: Kumar J and Arul Leena Rose P J; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


Author(s) thanks to Dr. Arul Leena Rose P J for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Kumar J and Arul Leena Rose P J, “Federated Learning Enabled Fog Computing Framework for DDoS Mitigation in SDN Based IoT Networks”, Journal of Machine and Computing, vol.5, no.3, pp. 1492-1502, July 2025, doi: 10.53759/7669/jmc202505118.


Copyright


© 2025 Kumar J and Arul Leena Rose P J. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.