f A Smart Secure model for Detection of DDoS Malicious Traces in Integrated LEO Satellite-Terrestrial Communications
FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

A Smart Secure model for Detection of DDoS Malicious Traces in Integrated LEO Satellite-Terrestrial Communications

Author(s): Lakshmisree Panigrahi, Binod Kumar Pattanayak*, Bibhuprasad Mohanty, Saumendra Pattnaik and Ahmad Khader Habboush

Publisher : FOREX Publication

Published : 30 May 2024

e-ISSN : 2347-470X

Page(s) : 503-511




Lakshmisree Panigrahi, Department of Computer Science and Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: laxmishreepanigrahi@soa.ac.in

Binod Kumar Pattanayak*, Department of Computer Science and Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: binodpattanayak@soa.ac.in

Bibhuprasad Mohanty, Department of Electronics and Communication Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: bibhumohanty@soa.ac.in

Saumendra Pattnaik, Department of Computer Science and Engineering, Institute of Technical Education & Research, Siksha ‘O’ Anusandhan (Deemed to be University), Bhubaneswar, India; Email: saumendrapattnaik@soa.ac.in

Ahmad Khader Habboush, faculty of Information Technology, Jerash University, Jerash, Jordan; Email: ahmad_ram2001@jpu.edu.jo

    [1] Lin, Z., Lin, M., Champagne, B., Zhu, W. P., & Al-Dhahir, N. (2020). Secure beamforming for cognitive satellite terrestrial networks with unknown eavesdroppers. IEEE Systems Journal, 15(2), 2186-2189. [CrossRef]
    [2] Lin, Z., Lin, M., Champagne, B., Zhu, W. P., & Al-Dhahir, N. (2020). Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks. IEEE Wireless Communications Letters, 10(2), 251-255. [CrossRef]
    [3] Boley, A. C., & Byers, M. (2021). Satellite mega-constellations create risks in Low Earth Orbit, the atmosphere and on Earth. Scientific Reports, 11(1), 10642. [CrossRef]
    [4] Del Portillo, I., Cameron, B. G., & Crawley, E. F. (2019). A technical comparison of three low earth orbit satellite constellation systems to provide global broadband. Acta astronautica, 159, 123-135. [CrossRef]
    [5] Rossi, A., Petit, A., & McKnight, D. (2020). Short-term space safety analysis of LEO constellations and clusters. Acta Astronautica, 175, 476-483. [CrossRef]
    [6] Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Alazab, M., ... & Gadekallu, T. R. (2022). Federated learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications.
    [7] Shah, S. M. J., Nasir, A., & Ahmed, H. (2014). A survey paper on security issues in satellite communication network infrastructure. International Journal of Engineering Research and General Science, 2(6), 887-900.
    [8] Li, H., Shi, D., Wang, W., Liao, D., Gadekallu, T. R., & Yu, K. (2022). Secure routing for LEO satellite network survivability. Computer Networks, 211, 109011. [CrossRef]
    [9] Muhaidheen, M., Muralidharan, S., & Vanaja, N. (2022). Multiport Converter for CubeSat. International Journal of Electrical and Electronics Research, 10(2), 290-296.
    [10] Zhang, Y., Wang, Y., Hu, Y., Lin, Z., Zhai, Y., Wang, L., ... & Kang, L. (2022). Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack. Sensors, 22(19), 7286. [CrossRef]
    [11] Ashraf, I., Narra, M., Umer, M., Majeed, R., Sadiq, S., Javaid, F., & Rasool, N. (2022). A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics, 11(4), 667.
    [12] Li, K., Zhou, H., Tu, Z., Wang, W., & Zhang, H. (2020). Distributed network intrusion detection system in satellite-terrestrial integrated networks using federated learning. IEEE Access, 8, 214852-214865. [CrossRef]
    [13] Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). Ieee. [CrossRef]
    [14] Aburomman, A. A., & Reaz, M. B. I. (2016). A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft Computing, 38, 360-372.
    [15] Aburomman, A. A., & Reaz, M. B. I. (2016, October). Ensemble of binary SVM classifiers based on PCA and LDA feature extraction for intrusion detection. In 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (pp. 636-640). IEEE. [CrossRef]
    [16] Ampomah, E. K., Qin, Z., & Nyame, G. (2020). Evaluation of tree-based ensemble machine learning models in predicting stock price direction of movement. Information, 11(6), 332. [CrossRef]
    [17] Divya, C. D., & Rajendra, A. B. (2020). Review on Prevailing Difficulties Using IriS Recognition. In Computational Vision and Bio-Inspired Computing: ICCVBIC 2019 (pp. 656-661). Springer International Publishing. [CrossRef]
    [18] Jenila, L., & Canessane, R. A. (2022). Cross Layer Based Dynamic Traffic Scheduling Algorithm for Wireless Multimedia Sensor Network. IJEER, 10(2), 399-404. [CrossRef]
    [19] Manhar, A., & Dembla, D. Improved Hybrid Routing Protocol (IHRP) in MANETs Based on Situation Based Adaptive Routing. [CrossRef]
    [20] Behera, B. B., Mohanty, R. K., & Pattanayak, B. K. (2022). Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach. Specialusis Ugdymas, 1(43), 879-905.
    [21] Ballav, B., Rana, G., & Pattanayak, B. K. (2015, December). Investigating the effect of Black Hole attack on Zone Based Energy Efficient Routing Protocol for Mobile Sensor Networks. In 2015 International Conference on Information Technology (ICIT) (pp. 113-118). IEEE. [CrossRef]
    [22] Swain, J., Pattanayak, B. K., & Pati, B. (2021). A systematic study and analysis of security issues in mobile ad-hoc networks. In Research anthology on securing mobile technologies and applications (pp. 144-150). IGI Global. [CrossRef]
    [23] Zhu, H.; Chen, S.Y.; Li, F.H.;Wu, H.; Zhao, H.Q.;Wang, G. User random access authentication protocol for low earth orbit satellite networks. J. Tsinghua Univ. (Sci. Technol.) 2019, 59, 1–8. [CrossRef].
    [24] K. Li, H. Zhou, Z. Tu, W. Wang and H. Zhang, "Distributed Network Intrusion Detection System in Satellite-Terrestrial Integrated Networks Using Federated Learning," in IEEE Access, vol. 8, pp. 214852-214865, 2020, doi: 10.1109/ACCESS.2020.3041641. [CrossRef]
    [25] https://www.keysight.com/us/en/assets/3122-1407/data-sheets/EXata-Cyber-Attack-Emulator-Library.pdf

Lakshmisree Panigrahi, Binod Kumar Pattanayak, Bibhuprasad Mohanty, Saumendra Pattnaik and Ahmad Khader Habboush (2024), A Smart Secure model for Detection of DDoS Malicious Traces in Integrated LEO Satellite-Terrestrial Communications. IJEER 12(2), 503-511. DOI: 10.37391/IJEER.120223.