Detection of distributed denial of service attack using enhanced adaptive deep dilated ensemble with hybrid meta-heuristic approach

被引:0
|
作者
Aliar, Ahamed Ali Samsu [1 ]
Gowri, V. [2 ]
Abins, A. Arockia [1 ]
机构
[1] Easwari Engn Coll, Dept Comp Sci & Engn, Chennai, India
[2] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Ramapuram, India
关键词
DDOS ATTACKS; OPTIMIZATION ALGORITHM; FRAMEWORK; MACHINE; SDN;
D O I
10.1002/ett.4921
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The biggest firms throughout the world now are the ones that offer services in the cloud. One of the top problems for cloud users (CUs) and cloud service providers (CSPs) is the availability of cloud-based services whenever needed. A distributed denial of service (DDoS) assault has been a significant threat to the security of the system in recent years. DDoS defense and detection of these attacks have become hot topics of research for academia and business. However, most approaches cannot accomplish efficient detection outcomes with few false alarms. As a result, minimizing the consequences of DDoS attacks allows CSPs to offer CUs high-quality services. In the cloud sector, a collective deep structured algorithm is suggested to identify DDoS attacks successfully. The recommended method contains several stages: data acquisition, pre-processing, optimal feature detection, and selection. The first step is the acquisition of data using the help of publicly available sources. Further, the input data undergoes preprocessing. Consequently, the optimal weighted feature selection takes place on the preprocessed data, where the optimization is done with the aid of the Hybrid Border Collie and Dragonfly Algorithm (HBCDA). Finally, DDoS attack detection is achieved via a novel method known as adaptive deep dilated ensemble (ADDE), which includes, one-dimensional convolutional neural network (1DCNN), deep temporal convolutional neural network (DTCNN), recurrent neural network (RNN), and bidirectional long short-term memory (Bi-LSTM). For the attainment of optimal results, the parameter tuning is accomplished by using the HBCDA approach. The detection outcome is computed by using the fuzzy ranking mechanism. The validation is done for the suggested method model, and its corresponding findings are validated with conventional techniques. Hence, the suggested approach outperforms the detection performance and ensures more efficiency than traditional approaches.
引用
收藏
页数:34
相关论文
共 50 条
  • [21] Optimizing Deep Learning Model for Software Cost Estimation Using Hybrid Meta-Heuristic Algorithmic Approach
    ul Hassan, Ch Anwar
    Khan, Muhammad Sufyan
    Irfan, Rizwana
    Iqbal, Jawaid
    Hussain, Saddam
    Ullah, Syed Sajid
    Alroobaea, Roobaea
    Umar, Fazlullah
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [22] Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud
    Britto Dennis, J.
    Shanmuga Priya, M.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (01):
  • [23] Improving distributed denial of service attack detection using supervised machine learning
    Fathima A.
    Devi G.S.
    Faizaanuddin M.
    Measurement: Sensors, 2023, 30
  • [24] Distributed Denial of Service Attack Detection Using Machine Learning and Class Oversampling
    Shafin, Sakib Shahriar
    Prottoy, Sakir Adnan
    Abbas, Saif
    Bin Hakim, Safayat
    Chowdhury, Abdullahi
    Rashid, Md Mamunur
    APPLIED INTELLIGENCE AND INFORMATICS, AII 2021, 2021, 1435 : 247 - 259
  • [25] Community Detection Using Meta-heuristic Approach: Bat Algorithm Variants
    Sharma, Jigyasha
    Annappa, B.
    2016 NINTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2016, : 109 - 115
  • [26] Intelligent Detection of Distributed Denial of Service Attacks: A Supervised Machine Learning and Ensemble Approach
    Ibrahim Alsumaidaie M.S.
    Ali Alheeti K.M.
    Alaloosy A.K.
    Iraqi Journal for Computer Science and Mathematics, 2023, 4 (03): : 12 - 24
  • [27] Statistical Approach Based Detection of Distributed Denial of Service Attack in a Software Defined Network
    Bavani, K.
    Ramkumar, M. P.
    Selvan, Emil G. S. R.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 380 - 385
  • [28] An Adaptive Hybrid Meta-heuristic Approach for Transmission Constrained Multi-objective GEP
    Charles, Julius Kilonzi
    Moses, Peter Musau
    Mbuthia, Jackson Mwangi
    2020 IEEE PES & IAS POWERAFRICA CONFERENCE, 2020,
  • [29] DeepDetect: Detection of distributed denial of service attacks using deep learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    Computer Journal, 2021, 63 (07): : 983 - 994
  • [30] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    COMPUTER JOURNAL, 2020, 63 (07): : 983 - 994