DDoS attacks require efficient detection due to challenges like latency, false positives, and resource inefficiency, especially in IoT and Fog-SDN setups. A framework combining ML and DL for real-time DDoS detection was evaluated against Logistic Regression, Random Forest, and CNN using benchmark datasets. Key metrics included accuracy, precision, recall, F1-score, false positive rate, latency, and resource use. The framework achieved 98.3% accuracy, surpassing CNN (95.6%), Random Forest (91.5%), and Logistic Regression (86.8%). Precision, recall, and F1-score were 98.7%, 97.8%, and 98.2%. False positive rates were 2.1%, compared to CNN (4.3%), Random Forest (6.4%), and Logistic Regression (8.2%). Latency was 30–110 ms for 100–500 requests in Fog-SDN versus 50–180 ms in cloud setups. Resource utilization was efficient: fog nodes 70%, cloud 60%, and IoT devices 40%. The proposed framework ensures high accuracy, low latency, and efficient resource use, perfect for real-time DDoS detection in Fog-SDN environments.
A. Rahdari et al., “Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions,” Computers, Materials & Continua, vol. 80, no. 2, pp. 2511–2533, 2024, doi: 10.32604/cmc.2024.052994.
S. Durairaj and R. Sridhar, “Coherent virtual machine provisioning based on balanced optimization using entropy-based conjectured scheduling in cloud environment,” Engineering Applications of Artificial Intelligence, vol. 132, p. 108423, Jun. 2024, doi: 10.1016/j.engappai.2024.108423.
F. Wahab, A. Shah, I. Khan, B. Ali, and M. Adnan, “An SDN-based Hybrid-DL-driven cognitive intrusion detection system for IoT ecosystem,” Computers and Electrical Engineering, vol. 119, p. 109545, Oct. 2024, doi: 10.1016/j.compeleceng.2024.109545.
R. Krishnan and S. Durairaj, “Reliability and performance of resource efficiency in dynamic optimization scheduling using multi-agent microservice cloud-fog on IoT applications,” Computing, vol. 106, no. 12, pp. 3837–3878, Jun. 2024, doi: 10.1007/s00607-024-01301-1.
A. A. Toony, F. Alqahtani, Y. Alginahi, and W. Said, “MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure,” Internet of Things, vol. 26, p. 101231, Jul. 2024, doi: 10.1016/j.iot.2024.101231.
S. S. Mahadik, P. M. Pawar, and R. Muthalagu, “Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues,” Multimedia Tools and Applications, vol. 83, no. 12, pp. 35371–35412, Sep. 2023, doi: 10.1007/s11042-023-16715-w.
X. Wu, Z. Jin, J. Zhou, K. Liu, and Z. Liu, “Against network attacks in renewable power plants: Malicious behavior defense for federated learning,” Computer Networks, vol. 250, p. 110577, Aug. 2024, doi: 10.1016/j.comnet.2024.110577.
S. Durairaj and R. Sridhar, “Task scheduling to a virtual machine using a multi‐objective mayfly approach for a cloud environment,” Concurrency and Computation: Practice and Experience, vol. 34, no. 24, Jul. 2022, doi: 10.1002/cpe.7236.
D. Khosnawi, S. Askar, Z. Soran, and H. Saeed, “Fog Computing in Next Generation Networks: A Review,” Indonesian Journal of Computer Science, vol. 13, no. 2, Apr. 2024, doi: 10.33022/ijcs.v13i2.3851.
J. Ahmad et al., “Machine learning and blockchain technologies for cybersecurity in connected vehicles,” WIREs Data Mining and Knowledge Discovery, vol. 14, no. 1, Sep. 2023, doi: 10.1002/widm.1515.
M. Seydali, F. Khunjush, and J. Dogani, "Streaming traffic classification: a hybrid deep learning and big data approach," Cluster Computing, pp. 1-29, 2024.
B. Isong, O. Kgote, and A. Abu-Mahfouz, “Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems,” Electronics, vol. 13, no. 12, p. 2370, Jun. 2024, doi: 10.3390/electronics13122370.
Z. Chen, M. Simsek, B. Kantarci, M. Bagheri, and P. Djukic, “Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier,” Computer Networks, vol. 250, p. 110576, Aug. 2024, doi: 10.1016/j.comnet.2024.110576.
A. Rahman et al., “Machine learning and deep learning-based approach in smart healthcare: Recent advances, applications, challenges and opportunities,” AIMS Public Health, vol. 11, no. 1, pp. 58–109, 2024, doi: 10.3934/publichealth.2024004.
P. Krishnan, K. Jain, S. R. Poojara, S. N. Srirama, T. Pandey, and R. Buyya, “eSIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks,” Computer Communications, vol. 216, pp. 324–345, Feb. 2024, doi: 10.1016/j.comcom.2023.12.023.
N. K. S. Nayak and B. Bhattacharyya, “An Intrusion Detection System for 5G SDN Network Utilizing Binarized Deep Spiking Capsule Fire Hawk Neural Networks and Blockchain Technology,” Future Internet, vol. 16, no. 10, p. 359, Oct. 2024, doi: 10.3390/fi16100359.
S. Alsubai, M. Umer, N. Innab, S. Shiaeles, and M. Nappi, “Multi-scale convolutional auto encoder for anomaly detection in 6G environment,” Computers & Industrial Engineering, vol. 194, p. 110396, Aug. 2024, doi: 10.1016/j.cie.2024.110396.
C. Kumar and Md. S. A. Ansari, “An explainable nature-inspired cyber attack detection system in Software-Defined IoT applications,” Expert Systems with Applications, vol. 250, p. 123853, Sep. 2024, doi: 10.1016/j.eswa.2024.123853.
T. Ghodsizad, "Internet of Medical Things with Considering of Artificial Intelligence," International Journal of Sustainable Applied Science and Engineering, vol. 1, no. 1, pp. 75-102, 2024.
V. Tomer, S. Sharma, and M. Davis, “Resilience in the Internet of Medical Things: A Review and Case Study,” Future Internet, vol. 16, no. 11, p. 430, Nov. 2024, doi: 10.3390/fi16110430.
D. Javeed, T. Gao, P. Kumar, and A. Jolfaei, “An Explainable and Resilient Intrusion Detection System for Industry 5.0,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 1342–1350, Feb. 2024, doi: 10.1109/tce.2023.3283704.
M. T. Masud, M. Keshk, N. Moustafa, I. Linkov, and D. K. Emge, “Explainable Artificial Intelligence for Resilient Security Applications in the Internetof Things,” IEEE Open Journal of the Communications Society, vol. 6, pp. 2877–2906, 2025, doi: 10.1109/ojcoms.2024.3413790.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Kumar J and Arul Leena Rose P J;
Methodology: Kumar J;
Visualization: Kumar J;
Investigation: Kumar J and Arul Leena Rose P J;
Supervision: Arul Leena Rose P J;
Validation: Kumar J;
Writing- Reviewing and Editing: Kumar J and Arul Leena Rose P J; All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
Author(s) thanks to Dr. Arul Leena Rose P J for this research completion and support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Arul Leena Rose P J
Department of Computer Science, Faculty of Science and Humanities, SRMIST, Kattankulathur, Chennai, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Kumar J and Arul Leena Rose P J, “Federated Learning Enabled Fog Computing Framework for DDoS Mitigation in SDN Based IoT Networks”, Journal of Machine and Computing, vol.5, no.3, pp. 1492-1502, July 2025, doi: 10.53759/7669/jmc202505118.