Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal of Computer Technology and Science

Hybrid Zero Trust Container Based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment Danang Danang; Eko Siswanto; Nuris Dwi Setiawan; Priyo Wibowo
International Journal of Computer Technology and Science Vol. 2 No. 3 (2025): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v2i3.291

Abstract

Growth rapid computing cloud, especially on academic, government, and service platforms. public, has trigger improvement frequency and complexity Distributed Denial of Service (DDoS) attacks. Intelligent DDoS attacks AI based capable copy pattern Then cross user valid, so that difficult detected and mitigated. The majority approach mitigation moment This nature reactive, no scalable, and tends to sacrifice availability service for authorized users. Research​ This aiming develop architecture proactive and adaptive defense​ For ensure continuity service during attack ongoing. Security model proposed hybrid​ integrating Zero Trust Architecture (ZTA), adaptive bandwidth control, and isolation service container -based. Architecture consists of from three layer Main: (1) ZTA Policy Engine which performs verification identity and assessment behavior through tokens and policies intelligent; (2) Adaptive Bandwidth Load Balancer which automatically dynamic separate and arrange Then cross based on reputation and level trust ; and (3) Containerized Service Cluster which groups request to in different containers For user trusted and not known . Components addition such as blockchain -based smart contracts are used For recording request and verification access , as well as lightweight AI module used for profiling then cross in real-time. Simulation results show that this model succeed increase availability service for user trusted during attack , press false positive rate , as well as optimize allocation source power. Integration of zero trust policies with intelligence Then cross and segmentation service in real-time forming framework effective and scalable defense​ to modern DDoS threats . In conclusion , the study This contributes a robust , adaptive , and modular architectural model for maintain continuity cloud services in condition network at risk .
Evaluating Trust Aware Machine Learning Models for Secure Data Sharing in Distributed Internet of Things and Edge Computing Infrastructures Eko Siswanto; Danang Danang; Sunarmi Sunarmi
International Journal of Computer Technology and Science Vol. 1 No. 1 (2024): International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i1.359

Abstract

The rapid growth of Internet of Things (IoT) and edge computing technologies has introduced new security challenges due to the distributed, heterogeneous, and dynamic nature of these environments. Conventional static security mechanisms, such as rulebased authentication and fixed trust models, are often inadequate for addressing evolving threats and abnormal behaviors in largescale IoT systems. To overcome these limitations, this study proposes a machine learningbased trust evaluation framework for enhancing security in distributed IoT environments. The proposed approach dynamically assesses the trustworthiness of IoT nodes by analyzing behavioral and interactionbased features collected at the edge layer. Machine learning models are trained to classify nodes into trusted and malicious categories and continuously update trust values in response to changing network conditions. Based on the predicted trust levels, adaptive security decisions are enforced to allow or restrict node participation in data sharing and computation processes. A quantitative experimental evaluation is conducted using simulated distributed IoT scenarios that include both normal and malicious behaviors. The performance of the proposed framework is evaluated using standard metrics such as accuracy, precision, recall, F1score, and detection effectiveness, and is compared against conventional static trust and rulebased security mechanisms. The results demonstrate that the proposed machine learningbased trust evaluation approach achieves significantly higher detection accuracy and robustness while maintaining low computational overhead. Overall, the findings confirm that integrating machine learning into trust management provides an effective and scalable solution for securing distributed IoT systems under dynamic and adversarial conditions.