{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T06:42:22Z","timestamp":1772001742499,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Foundation for Science and Technology (FCT, Portugal)","award":["LA\/P\/0112\/2020"],"award-info":[{"award-number":["LA\/P\/0112\/2020"]}]},{"name":"Foundation for Science and Technology (FCT, Portugal)","award":["UIDB\/00147\/2020"],"award-info":[{"award-number":["UIDB\/00147\/2020"]}]},{"name":"Foundation for Science and Technology (FCT, Portugal)","award":["UIDP\/00147\/2020"],"award-info":[{"award-number":["UIDP\/00147\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>The widespread adoption of Internet of Things (IoT) devices has been accompanied by a remarkable rise in both the frequency and intensity of Distributed Denial of Service (DDoS) attacks, which aim to overwhelm and disrupt the availability of networked systems and connected infrastructures. In this paper, we present a novel approach to DDoS attack detection and mitigation that integrates state-of-the-art machine learning techniques with Blockchain-based Mobile Edge Computing (MEC) in IoT environments. Our solution leverages the decentralized and tamper-resistant nature of Blockchain technology to enable secure and efficient data collection and processing at the network edge. We evaluate multiple machine learning models, including K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), Transformer architectures, and LightGBM, using the CICDDoS2019 dataset. Our results demonstrate that Transformer models achieve a superior detection accuracy of 99.78%, while RF follows closely with 99.62%, and LightGBM offers optimal efficiency for real-time detection. This integrated approach significantly enhances detection accuracy and mitigation effectiveness compared to existing methods, providing a robust and adaptive mechanism for identifying and mitigating malicious traffic patterns in IoT environments.<\/jats:p>","DOI":"10.3390\/computation13070158","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T10:45:08Z","timestamp":1751366708000},"page":"158","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing DDoS Attacks Mitigation Using Machine Learning and Blockchain-Based Mobile Edge Computing in IoT"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8379-3589","authenticated-orcid":false,"given":"Mahmoud","family":"Chaira","sequence":"first","affiliation":[{"name":"D\u00e9partement Marketing, Ecole Sup\u00e9rieure de Commerce, Kolea 42400, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4272-6232","authenticated-orcid":false,"given":"Abdelkader","family":"Belhenniche","sequence":"additional","affiliation":[{"name":"SYSTEC-ARISE Research Center for Systems and Technologies, Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias s\/n, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5179-4344","authenticated-orcid":false,"given":"Roman","family":"Chertovskih","sequence":"additional","affiliation":[{"name":"SYSTEC-ARISE Research Center for Systems and Technologies, Faculty of Engineering, University of Porto, Rua Dr. Roberto Frias s\/n, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"42236","DOI":"10.1109\/ACCESS.2021.3062909","article-title":"Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments","volume":"9","author":"Aljuhani","year":"2021","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","article-title":"Internet of Things \u2013 New security and privacy challenges","volume":"26","author":"Weber","year":"2010","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3929","DOI":"10.1109\/TNET.2024.3408675","article-title":"Correlation-aware neural networks for DDoS attack detection in IoT systems","volume":"32","author":"Hekmati","year":"2024","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"5050","DOI":"10.1109\/JIOT.2022.3221967","article-title":"Transformer-based device-type identification in heterogeneous IoT traffic","volume":"10","author":"Luo","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"48890","DOI":"10.1109\/ACCESS.2022.3172432","article-title":"A security model based on LightGBM and transformer to protect healthcare systems from cyberattacks","volume":"10","author":"Ghourabi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hallman, R., Bryan, J., Palavicini, G., Divita, J., and Romero-Mariona, J. (2017, January 24\u201326). IoDDoS\u2014The Internet of Distributed Denial of Service Attacks: A Case Study of the Mirai Malware and IoT-Based Botnets. Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, Porto, Portugal.","DOI":"10.5220\/0006246600470058"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and Other Botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Abomhara, M., and K\u00f8ien, G.M. (2014, January 11\u201314). Security and privacy in the Internet of Things: Current status and open issues. Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), Aalborg, Denmark.","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","article-title":"A comprehensive study of DDoS attacks over IoT network and their countermeasures","volume":"127","author":"Kumari","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_11","unstructured":"Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Arbor, A., and Invernizzi, L. (2017, January 16\u201318). Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., and Prakash, A. (2016, January 22\u201326). Security Analysis of Emerging Smart Home Applications. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2016.44"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1550147717741463","DOI":"10.1177\/1550147717741463","article-title":"A survey of distributed denial-of-service attack, prevention, and mitigation techniques","volume":"13","author":"Mahjabin","year":"2017","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Adat, V.V., and Gupta, B.B. (2017, January 6\u20138). A DDoS attack mitigation framework for internet of things. Proceedings of the 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, India.","DOI":"10.1109\/ICCSP.2017.8286761"},{"key":"ref_15","first-page":"2317","article-title":"DDoS attack detection using MLP and Random Forest Algorithms","volume":"14","author":"Najar","year":"2022","journal-title":"Int. J. Inf. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.procs.2021.02.003","article-title":"A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing","volume":"182","author":"Lawal","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Manikumar, D.V.V.S., and Maheswari, B.U. (2020, January 15\u201317). Blockchain Based DDoS Mitigation Using Machine Learning Techniques. Proceedings of the 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India.","DOI":"10.1109\/ICIRCA48905.2020.9183092"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Javaid, U., Siang, A.K., Aman, M.N., and Sikdar, B. (2018, January 15). Mitigating IoT Device based DDoS Attacks using Blockchain. Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock\u201918), Munich, Germany.","DOI":"10.1145\/3211933.3211946"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s11042-024-18842-4","article-title":"Leveraging blockchain and machine learning to counter DDoS attacks over IoT network","volume":"84","author":"Kumari","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Berr\u00edos, S., Garcia, S., Hermosilla, P., and Allende-Cid, H. (2025). A Machine-Learning-Based Approach for the Detection and Mitigation of Distributed Denial-of-Service Attacks in Internet of Things Environments. Appl. Sci., 15.","DOI":"10.3390\/app15116012"},{"key":"ref_21","unstructured":"Canadian Institute for Cybersecurity (2024, May 19). DDoS Evaluation Dataset (CICDDoS2019). Available online: https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Sasikala, B., Biju, V., and Prashanth, C. (2017, January 19\u201320). Kappa and accuracy evaluations of machine learning classifiers. Proceedings of the 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India.","DOI":"10.1109\/RTEICT.2017.8256551"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Thepade, S., Das, R., and Ghosh, S. (2013, January 13\u201315). Performance comparison of feature vector extraction techniques in RGB color space using block truncation coding for content based image classification with discrete classifiers. Proceedings of the 2013 Annual IEEE India Conference (INDICON), Mumbai, India.","DOI":"10.1109\/INDCON.2013.6726053"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Awad, M., and Khanna, R. (2015). Support Vector Machines for Classification. Efficient Learning Machines: Theories, Concepts, and Applications for Engineers and System Designers, Apress.","DOI":"10.1007\/978-1-4302-5990-9"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kokila, R., Somasundaram, T.S., and Kannan, G. (2014, January 17\u201319). DDoS detection and analysis in SDN-based environment using support vector machine classifier. Proceedings of the 2014 Sixth International Conference on Advanced Computing (ICoAC), Chennai, India.","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random Forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"56145","DOI":"10.1109\/ACCESS.2022.3175516","article-title":"Long-Term Prediction of Network Security Situation Through the Use of the Transformer-Based Model","volume":"10","author":"Yin","year":"2022","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"121530","DOI":"10.1016\/j.eswa.2023.121530","article-title":"An Efficient LightGBM-Based Differential Evolution Method for Nonlinear Inelastic Truss Optimization","volume":"237","author":"Truong","year":"2024","journal-title":"Expert Syst. Appl."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/7\/158\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:02:40Z","timestamp":1760032960000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/7\/158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":29,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["computation13070158"],"URL":"https:\/\/doi.org\/10.3390\/computation13070158","relation":{},"ISSN":["2079-3197"],"issn-type":[{"value":"2079-3197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,1]]}}}