RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.16Keywords:
Internet of things, Wireless sensor network, Recurrent neural network, Random forest, Support vector machine, DDOS attack.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Distributed Denial of Service (DDoS) attacks have significantly impacted network performance and stability in Internet of Things (IoT) Wireless Sensor Networks (WSNs) that utilize the Routing Protocol for Low-Power and Lossy Networks (RPL). These attacks cause severe network degradation or failure by flooding network nodes with malicious traffic, which interferes with communication. This study presents an ensemble of machine-learning techniques to detect DDoS attacks in RPL-based IoT-WSN systems, including an RNN-biased Random Forest (RF) and Support Vector Machine (SVM) classifier. The Recurrent Neural Network (RNN) is used to identify attack sequences by capturing temporal patterns in network data. A Random Forest classifier integrates these temporal features and employs many decision trees to improve detection accuracy. An SVM is used to greatly enhance the detecting process. It differentiates between attack and legitimate traffic using robust decision boundaries. The ensemble model improves overall performance in detecting DDoS attacks with greater accuracy, fewer false positives, and improved flexibility in changing attack plans by utilizing the advantages of each technique. Despite the resource limitations present in IoT-WSN environments, experimental results show that this ensemble technique is effective in real-time detection. This approach offers an effective defense against DDoS attacks for Internet of Things networks, guaranteeing dependable communication in networks with limited power and resources.Abstract
How to Cite
Downloads
Similar Articles
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Porselvi, D. Kanchana, Beulah Jackson, L. Vigneash, Dynamic resource management for 6G vehicular networks: CORA-6G offloading and allocation strategies , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- M. A. Shanti, Optimizing predictive accuracy: A comparative study of feature selection strategies in the healthcare domain , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- E. J. David Prabahar, J. Manalan, J. Franklin, A literature review on the information literacy competency among scholars of co-education colleges and women’s colleges , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- B. Nivedetha, Water Quality Prediction using AI and ML Algorithms , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper

