Security of Next-Generation Networks: A Hybrid Approach Using ML-Algorithm and Game Theory with SDWSN

Authors

  • Muhammad Danish Department of Computer Science, Superior University Lahore, 54000, Pakistan Author
  • Shaheryar Shahid Department of Computer Science, Superior University Lahore, 54000, Pakistan Author
  • Abdul Ghafar Department of Computer Science, Superior University Lahore, 54000, Pakistan Author
  • Khalid Hamid Department of Computer Science, Superior University Lahore, 54000, Pakistan Author
  • Noman Ali Department: Department of Computer Science & Engineering, University of Engineering & Technology Lahore, Narowal, 54000, Pakistan Author
  • Amarah Ghani Department of Computer Science Sahara Medical College Narowal, 54000, Pakistan Author
  • Sikandar Ali Mandan Faculty of Artificial Intelligence, Department of Smart Engineering and Advanced Technology, Universti Teknologi Malaysia, Kuala Lumpur, Malaysia Author
  • Muhammad Ibrar Department of Computer & Mathematical Sciences New Mexico Highlands University, Las Vegas, USA Author

DOI:

https://doi.org/10.63075/wdpwrr31

Abstract

The world is moving towards an internet revolution as technology is improving day by day and usage of the internet is increasing as well. With the increase in usage of the internet and improved technology, we are facing new more vulnerable and sophisticated attacks. To deal with them we have secure our network and make sure we maximize the security and minimize the threat to our technology and network. In this paper, we have analyzed the network security models, comparatively. SDWSN (Software Defined Wireless Sensor Network) is one of the most secure and advanced networking that uses the EASDN (Energy Aware Software Defined Network) protocol that maximizes the efficiency of the network. We have proposed that if we integrate XGBOOST or Random Forest ML learning to train data for DDoS detection and Game theory for network security we can build a more secure and efficient network model. In the future, we are focusing on how can we integrate ZTNA (Zero Trust Network Architecture) in the proposed model.

Downloads

Download data is not yet available.

Published

2025-04-09

How to Cite

Security of Next-Generation Networks: A Hybrid Approach Using ML-Algorithm and Game Theory with SDWSN. (2025). Annual Methodological Archive Research Review, 3(4), 18-36. https://doi.org/10.63075/wdpwrr31